We describe a new function called SQUASH (which is short for SQUare-hASH), which is ideally suited to challenge-response MAC applications in highly constrained devices such as RFID tags. It is exceptionally simple, requires no source of random bits, and can be efficiently implemented on processors with arbitrary word sizes. Unlike other ad-hoc proposals which have no security analysis, SQUASH is provably at least as secure as Rabin's public key encryption scheme in this application. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Shamir, A. (2008). SQUASH - A new MAC with provable security properties for highly constrained devices such as RFID tags. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5086 LNCS, pp. 144–157). https://doi.org/10.1007/978-3-540-71039-4_9
Mendeley helps you to discover research relevant for your work.