Notice
There is currently an issue with the citation download feature. Learn more

2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications

14-15 March 2011

Filter Results

Displaying Results 1 - 20 of 20
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (1868 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (13 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (158 KB)
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2011, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2011, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Additional Reviewers

    Publication Year: 2011, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Practical and Secure Software-Based Attestation

    Publication Year: 2011, Page(s):1 - 9
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Software-based attestation can be used for guaranteed detection of any active malware on a device. This promises a significant advance in the battle against malware, including mobile malware. However, most software based attestation methods are either heuristic or unsuitable for mobile computing - and often both. One recent software-based attestation method uses so-called memory-printing to produc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Verifiable Implicit Asking Protocol for Diffie-Hellman Key Exchange

    Publication Year: 2011, Page(s):10 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (337 KB) | HTML iconHTML

    An efficient verifiable implicit asking (VIA) protocol for Diffie-Hellman key exchange and its improvement are proposed. The proposed protocol utilizes an existing efficient implicit asking protocol for secret computation of RSA cryptosystem. The structure of the proposed protocol makes it resistant to both active and passive attacks. An known passive attack that decreases efficiency is not applie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems

    Publication Year: 2011, Page(s):20 - 25
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership transfer of RFID tags is also another important requirement for some applications. Namely, the owner of an RFID tag may be required to change several times during its life-cycle. For an ownership transfer, the server of the new owner takes over tag authorization in orde... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Hardware-Oriented Message Authentication with Applications towards RFID

    Publication Year: 2011, Page(s):26 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    We consider ultra light-weight constructions of message authentication in hardware applications like RFID. We propose a new type of constructions that will be less costly to implement in hardware, compared to any previous construction. These constructions are based on the framework of universal hash functions, Toeplitz matrices and epsilon-biased sample spaces. Some new theoretical results in this... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-distribution

    Publication Year: 2011, Page(s):34 - 43
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (671 KB) | HTML iconHTML

    Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Short Group Signatures with Controllable Linkability

    Publication Year: 2011, Page(s):44 - 52
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    In this paper, we present a short group signature scheme for dynamic membership with controllable link ability. The controllable link ability enables an entity who possesses a special linking key to check if two signatures are from the same signer while preserving anonymity. It can be used for various anonymity-based applications that require necessarily the link ability such as vehicular adhoc ne... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • F-HB: An Efficient Forward Private Protocol

    Publication Year: 2011, Page(s):53 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB) | HTML iconHTML

    Radio Frequency IDentification (RFID) is a leading ubiquitous computing technology for the future. However, the rapid deployment of low-cost RFID tags in large scale raises significant personal privacy threats. Low-cost tags are extremely resource-constrained devices. Hence it is easy to corrupt a low-cost RFID tag to obtain useful information, trace its history and discover its identity. Therefor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and Efficient FPGA Implementation of Montgomery Inversion

    Publication Year: 2011, Page(s):61 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    Modular inversion is an operation frequently used in many contemporary cryptographic applications, especially in public-key crypto-systems. In this paper, we present an efficient, scalable and generic hardware implementation of modular inversion operation optimized for a class of FPGA (Field Programmable Gate Array) devices. The long carry chains, which increase critical path delay, are avoided by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Short-Key Certificateless Encryption

    Publication Year: 2011, Page(s):69 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The notion of certificate less public key encryption (CL-PKE or CLE) was initiated by Al Riyami and Paterson and grew out of the need for a public key mechanism to eliminate the built-in key escrow of identity based encryption (IBE) without introducing digital certificates and the management overhead that this entails. Unlike other approaches that require complex private or public keys, an efficie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Ultra Lightweight Crypto Processor

    Publication Year: 2011, Page(s):76 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    In this paper, a lightweight processor suitable for lightweight cryptographic applications is presented. The processor instruction set is based on the stack-based ZPU architecture. In addition, a simple generic plug-in interface is implemented in order to allow integration of application specific coprocessors to the main processor core. In the current version of the processor, a simple direct memo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2011, Page(s): 84
    Request permission for commercial reuse | PDF file iconPDF (79 KB)
    Freely Available from IEEE
  • [Publishers information]

    Publication Year: 2011, Page(s): 86
    Request permission for commercial reuse | PDF file iconPDF (140 KB)
    Freely Available from IEEE