作者: Yuji Nagai , Toshihiro Suzuki , Taku Kato , Tatsuyuki Matsushita , Noboru Shibata
DOI:
关键词:
摘要: According to one embodiment, an authentication method includes generating, by the memory, first information calculating secret identification with a memory session key in one-way function operation, transmitting encrypted information, family block, and host, second generated decrypting host operation. The further comparing, information.