메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 1-4

Securing ubiquitous and low-cost RFID using tiny encryption algorithm

Author keywords

Encryption; Low power; Low area; Low cost; RFID; TEA; Tiny Encryption

Indexed keywords

ALGORITHMS; COMPUTER HARDWARE; COSTS; ENERGY UTILIZATION; INTEGRATED CIRCUITS; PUBLIC KEY CRYPTOGRAPHY; REQUIREMENTS ENGINEERING; SECURITY OF DATA;

EID: 33750397049     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (20)
  • 1
    • 84858908574 scopus 로고    scopus 로고
    • Towards the 50 tag
    • MIT Auto-ID Center, February
    • Sanjay E. Sarma," Towards the 50 Tag", Technical Report MIT-AUTOID-WH-006, MIT Auto-ID Center, February 2001
    • (2001) Technical Report , vol.MIT-AUTOID-WH-006
    • Sarma, S.E.1
  • 2
    • 2342503141 scopus 로고    scopus 로고
    • RFID privacy workshop
    • Mar-Apr
    • S.A Weis, "RFID privacy workshop," IEEE Security & Privacy Magazine, Issue 2, vol.2, pp. 48-50, Mar-Apr 2004
    • (2004) IEEE Security & Privacy Magazine , vol.2 , Issue.2 , pp. 48-50
    • Weis, S.A.1
  • 5
    • 33750398954 scopus 로고    scopus 로고
    • RSA Security, RSA Laboratories, The Blocker Tag,http://www.rsasecurity. com/rsalabs/node.asp?id=2060
    • The Blocker Tag
  • 6
    • 33144466214 scopus 로고    scopus 로고
    • RFID privacy using user-controllable uniqueness
    • MIT, Massachusetts, November 15
    • Sozo Inoue and Hiroto Yasuura, "RFID Privacy Using User-controllable Uniqueness," Proc. RFID Privacy Workshop, MIT, Massachusetts, November 15, 2003
    • (2003) Proc. RFID Privacy Workshop
    • Inoue, S.1    Yasuura, H.2
  • 7
    • 33750402779 scopus 로고    scopus 로고
    • Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience
    • Brunwick, Canada, October 13-15
    • Stephan J Engberg, Morten B Harning, and Christian D Jensen, "Zero-Knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience," Proceedings of second annual conference on Privacy, Security and Trust, pp. 89-101, Brunwick, Canada, October 13-15, 2004.
    • (2004) Proceedings of Second Annual Conference on Privacy, Security and Trust , pp. 89-101
    • Engberg, S.J.1    Harning, M.B.2    Jensen, C.D.3
  • 11
    • 34147119078 scopus 로고    scopus 로고
    • Design and implementation of low power hardware encryption for low cost secure RFID using TEA
    • Dec
    • P. Israsena, "Design and Implementation of Low Power Hardware Encryption for Low Cost Secure RFID using TEA, Proc. ICICS 2005, Dec 2005
    • (2005) Proc. ICICS 2005
    • Israsena, P.1
  • 14
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • LNCS, Springer-Verlag
    • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer, "Strong Authentication for RFID Systems using the AES Algorithm," CHES 2004, LNCS Vol. 3156, Springer-Verlag 2004
    • (2004) CHES 2004 , vol.3156
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 15
    • 67650338267 scopus 로고    scopus 로고
    • Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and triple-DES
    • Springer-Verlag
    • John Kelsey, Bruce Schneier, and David Wagner, "Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES," LNCS, Vol. 1109, pp. 237-251, Springer-Verlag 1996
    • (1996) LNCS , vol.1109 , pp. 237-251
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 16
    • 0006540774 scopus 로고    scopus 로고
    • Related-key cryptanalysis of 3-WAY, biham-DES, CAST, DES-X NewDES, RC2, and TEA
    • Springer-Verlag
    • John Kelsey, Bruce Schneier, and David Wagner, "Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA," LNCS, Vol. 1334, pp. 233-246, Springer-Verlag 1997
    • (1997) LNCS , vol.1334 , pp. 233-246
    • Kelsey, J.1    Schneier, B.2    Wagner, D.3
  • 18
    • 84944877872 scopus 로고    scopus 로고
    • Efficient rijndael encryption implementation with composite field arithmetic
    • LNCS Springer-Verlag
    • Atri Rudra, Pradeep K. Dubey, Charanjit S. Jutla, Vijay Kumar, Josyula R. Rao, and Pankaj Rohatgi, "Efficient Rijndael Encryption Implementation with Composite Field Arithmetic," Proc CHES 2001, LNCS Vol. 2162, pp. 171-184, Springer-Verlag 2001
    • (2001) Proc CHES 2001 , vol.2162 , pp. 171-184
    • Rudra, A.1    Dubey, P.K.2    Jutla, C.S.3    Kumar, V.4    Rao, J.R.5    Rohatgi, P.6
  • 19
  • 20
    • 33750394787 scopus 로고    scopus 로고
    • 860MHz class I radio frequency identification tag radio frequency & logical communication interface specification proposed recommendation version 1.0.0
    • Nov.
    • Auto-ID center, "860MHz Class I Radio Frequency Identification Tag Radio Frequency & Logical Communication Interface Specification Proposed Recommendation Version 1.0.0", Technical Report MIT-AUTOID-TR-007, Nov. 2002
    • (2002) Technical Report , vol.MIT-AUTOID-TR-007


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.