메뉴 건너뛰기




Volumn 4277 LNCS - I, Issue , 2006, Pages 372-381

A case against currently used hash functions in RFID protocols

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CONSTRAINT THEORY; ENERGY EFFICIENCY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 33845429016     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11915034_61     Document Type: Conference Paper
Times cited : (118)

References (16)
  • 1
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID authentication protocol for ubiquitous computing environment
    • Embedded and Ubiquitous Computing - EUC 2005 Workshops, . Springer, December
    • E. Y. Choi, S.-M. Lee, and D. H. Lee. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In Embedded and Ubiquitous Computing - EUC 2005 Workshops, volume 3823 of LNCS, pages 945-954. Springer, December 2005.
    • (2005) LNCS , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.-M.2    Lee, D.H.3
  • 4
    • 77956436878 scopus 로고    scopus 로고
    • A hardware implementation of MD4-family hash algorithms
    • IEEE Computer Society, October
    • S. Dominkus. A hardware implementation of MD4-family hash algorithms. In 9th IEEE International Conference on Electronics, Circuits and Systems, volume 3, pages 1143-1146. IEEE Computer Society, October 2002.
    • (2002) 9th IEEE International Conference on Electronics, Circuits and Systems , vol.3 , pp. 1143-1146
    • Dominkus, S.1
  • 5
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Cryptographic Hardware and Embedded Systems - CHES 2004, . Springer, August
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong Authentication for RFID Systems using the AES Algorithm. In Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of LNCS, pages 357-370. Springer, August 2004.
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 10
    • 3042644992 scopus 로고    scopus 로고
    • November
    • National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
    • (2001) FIPS-197: Advanced Encryption Standard
  • 11
    • 4043135942 scopus 로고    scopus 로고
    • August
    • National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
    • (2002) FIPS-180-2: Secure Hash Standard
  • 12
    • 33845408702 scopus 로고    scopus 로고
    • A universal and efficient SHA-256 implementation for FP-GAs
    • ISBN 3-200-00211-5
    • N. Pramstaller and M. Aigner. A Universal and Efficient SHA-256 Implementation for FP-GAs. In Austrochip 2004, pages 89-93, 2004. ISBN 3-200-00211-5.
    • (2004) Austrochip 2004 , pp. 89-93
    • Pramstaller, N.1    Aigner, M.2
  • 13
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Security in Pervasive Computing, Second International Conference, SPC 2005, . Springer
    • K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In Security in Pervasive Computing, Second International Conference, SPC 2005, volume 3450 of LNCS, pages 70-84. Springer, 2005.
    • (2005) LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 15
    • 15544371957 scopus 로고    scopus 로고
    • Implementation of the SHA-2 hash family standard using FPGAs
    • March
    • N. Sklavos and O. Koufopavlou. Implementation of the SHA-2 Hash Family Standard Using FPGAs. The Journal of Supercomputing, 31(3):227-248, March 2005.
    • (2005) The Journal of Supercomputing , vol.31 , Issue.3 , pp. 227-248
    • Sklavos, N.1    Koufopavlou, O.2
  • 16
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • 1st Annual Conference on Security in Pervasive Computing
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In 1st Annual Conference on Security in Pervasive Computing, volume 2802 of LNCS, pages 201-212, 2003.
    • (2003) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.