Secure implementation of the stern authentication and signature schemes for low-resource devices

19Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we describe the first implementation on smartcard of the code-based authentication protocol proposed by Stern at Crypto'93 and we give a securization of the scheme against side channel attacks. On the whole, this provides a secure implementation of a very practical authentication (and possibly signature) scheme which is mostly attractive for light-weight cryptography. © IFIP International Federation for Information Processing 2008.

Cite

CITATION STYLE

APA

Cayrel, P. L., Gaborit, P., & Prouff, E. (2008). Secure implementation of the stern authentication and signature schemes for low-resource devices. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5189 LNCS, pp. 191–205). https://doi.org/10.1007/978-3-540-85893-5_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free