SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.

Bibliographic Details
Title: SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags.
Authors: Shamir, Adi
Source: Fast Software Encryption (9783540710387); 2008, p144-157, 14p
Abstract: We describe a new function called SQUASH (which is short for SQUare-hASH), which is ideally suited to challenge-response MAC applications in highly constrained devices such as RFID tags. It is exceptionally simple, requires no source of random bits, and can be efficiently implemented on processors with arbitrary word sizes. Unlike other ad-hoc proposals which have no security analysis, SQUASH is provably at least as secure as Rabin΄s public key encryption scheme in this application. [ABSTRACT FROM AUTHOR]
Copyright of Fast Software Encryption (9783540710387) is the property of Springer Nature / Books and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
DOI: 10.1007/978-3-540-71039-4_9
Database: Complementary Index