A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity
[chapter]
2020
Lecture Notes in Computer Science
The rapid proliferation of Radio Frequency Identification (RFID) tags in the past decade has made tremendous impact on our daily lives. As part of Internet of Things (IoT), RFID technology ensures an efficient, secure and reliable system to identify tagged objects in supply chain environment such as manufacturing, automotive and healthcare. Several lightweight authentication solutions have been proposed to satisfy optimal security and privacy features of RFID communication. Hopper-Blum (HB)
doi:10.1007/978-3-030-61078-4_6
fatcat:u7s5aupi6bagbpvkrgoqd63lri