Authentication methods and apparatus utilizing hash chains

作者: Ari Juels

DOI:

关键词:

摘要: A first processing device, which may be, for example, a wireless authentication token or an RFID tag, comprises memory, processor coupled to the and interface circuitry processor. The is operative control output of information via circuitry, where sequence values corresponding images hash chain. given one utilized by second device generate modified value suitable providing joint devices.

参考文章(11)
Stephen H. Dohrmann, Carl M. Ellison, Time varying presentation of items based on a key hash ,(2001)
Jaap-Henk Hoepman, The Ephemeral Pairing Problem financial cryptography. pp. 212- 226 ,(2004) , 10.1007/978-3-540-27809-2_22
Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung, Funkspiel schemes: an alternative to conventional tamper resistance computer and communications security. pp. 125- 133 ,(2000) , 10.1145/352600.352619
Frank Stajano, Ross Anderson, The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks international workshop on security. pp. 172- 194 ,(1999) , 10.1007/10720107_24
M. Jakobsson, Fractal hash sequence representation and traversal international symposium on information theory. pp. 437- ,(2002) , 10.1109/ISIT.2002.1023709