Author of the publication

On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol.

, , , , and . IACR Cryptol. ePrint Arch., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Designing Lightweight RFID Security Protocols for Medical IoT., , , and . IACR Cryptology ePrint Archive, (2019)On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol., , , , and . IACR Cryptol. ePrint Arch., (2015)Selecting the right IoT technologies to build a connected bus shelter for smart cities., and . TESCA, page 2-3. ACM, (2019)Improving RFID/IoT-based generalized ultra-lightweight mutual authentication protocols., , , , and . J. Inf. Secur. Appl., (2022)IoT Device Security: Challenging Ä Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function"., , , and . Sensors, 18 (12): 4444 (2018)An improved low-cost yoking proof protocol based on Kazahaya's flaws., , , and . J. Supercomput., 74 (5): 1934-1948 (2018)ECCbAP: A secure ECC-based authentication protocol for IoT edge devices., , , and . Pervasive Mob. Comput., (2020)An Authentication Protocol for Next Generation of Constrained IoT Systems., , , , , and . IEEE Internet Things J., 9 (21): 21493-21504 (2022)A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications., , , and . J. Supercomput., 74 (1): 71-86 (2018)Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol., , , and . Future Internet, 16 (1): 9 (2024)