February 2002
·
1 Read
·
1 Citation
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
February 2002
·
1 Read
·
1 Citation
October 2001
·
2 Reads
·
2 Citations
October 2000
·
80 Reads
·
2 Citations
A modified Rabin signature scheme is presented based on quadratic residue problem. The main advantage of the modified scheme is simpler to describe and more efficient to implement. There is no limitation for plain test space, especially only one modular multiplication is required for verification, and it is secure against chosen-ciphertext attack.
... It is suitable for low-cost RFID tags, but the protocol only implements one-way authentication as well. Two practical signature schemes have been introduced based on the Rabin encryption algorithm with simple verification advantage in [20]. A low cost two-way authentication protocol based on the public key encryption algorithm has been proposed in [21], however, the computational complexity of the public key encryption algorithm is beyond the computational power of the RFID tag. ...
October 2000