Learn More
This paper presents the first formalization of partial key leakage security of a <i>two-pass</i> two-party authenticated key exchange (AKE) protocol on the extended Canetti-Krawczyk (eCK) security model. Our formalization, &#955;-leakage resilient eCK security, is a (stronger) generalization of the eCK security model with enhanced by the notion of(More)
We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the(More)
The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to(More)
RFID tags are getting their presence noticeable and are expected to become an important tool for e-commerce, logistics, point-of-sale transactions, and so on, representing " things " and " human holding things " in transactions. Since a huge amount of tags are expected to be needed to be attached to various " objects, " a low-cost tag manufacturing is(More)