메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1839-1842

Strong crypto for RFID tags - A comparison of low-power hardware implementations

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ELECTRIC POWER UTILIZATION; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 34548814766     PISSN: 02714310     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iscas.2007.378272     Document Type: Conference Paper
Times cited : (78)

References (12)
  • 1
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • February
    • A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, February 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 2
    • 34548812979 scopus 로고    scopus 로고
    • ISO/IEC 9798-2: Information technology - Security techniques - Entity authentication-Mechanisms using symmetric encipherment algorithms
    • International Organisation for Standardization ISO
    • International Organisation for Standardization (ISO), "ISO/IEC 9798-2: Information technology - Security techniques - Entity authentication-Mechanisms using symmetric encipherment algorithms," 1999.
    • (1999)
  • 3
    • 33744940544 scopus 로고    scopus 로고
    • Efficient RFID Authentication Protocol for Ubiquitous Computing Environment
    • Embedded and Ubiquitous Computing, EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, Springer, December
    • E. Y. Choi, S.-M. Lee, and D. H. Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment." in Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki., Japan, December 6-9, 2005, Proceedings, ser. Lecture Notes in Computer Science, vol. 3823. Springer, December 2005, pp. 945-954.
    • (2005) ser. Lecture Notes in Computer Science , vol.3823 , pp. 945-954
    • Choi, E.Y.1    Lee, S.-M.2    Lee, D.H.3
  • 7
    • 24644501824 scopus 로고    scopus 로고
    • K. Rhee, J. Kwak, S. Kim, and D. Won, Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. in Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, ser. Lecture Notes in Computer Science, D. Hutter and M. Ullmann, Eds., 3450. Springer, April 2005, pp. 70-84.
    • K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment." in Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, ser. Lecture Notes in Computer Science, D. Hutter and M. Ullmann, Eds., vol. 3450. Springer, April 2005, pp. 70-84.
  • 8
    • 35048876270 scopus 로고    scopus 로고
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, in Security in Pervasive Computing, 1st Annual Conference on Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003, Revised Papers, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., 2802. Springer, March 2003, pp. 201-212.
    • S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," in Security in Pervasive Computing, 1st Annual Conference on Security in Pervasive Computing, Boppard, Germany, March 12-14, 2003, Revised Papers, ser. Lecture Notes in Computer Science, D. Hutter, G. Müller, W. Stephan, and M. Ullmann, Eds., vol. 2802. Springer, March 2003, pp. 201-212.
  • 9
    • 35048859848 scopus 로고    scopus 로고
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems using the AES Algorithm, in Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., 3156. Springer, August 2004, pp. 357-370.
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems using the AES Algorithm," in Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., vol. 3156. Springer, August 2004, pp. 357-370.
  • 12
    • 34548842059 scopus 로고    scopus 로고
    • Hardware Aspects of Elliptic Curve Cryptography,
    • Ph.D. dissertation, Graz University of Technology, August
    • J. Wolkerstorfer, "Hardware Aspects of Elliptic Curve Cryptography," Ph.D. dissertation, Graz University of Technology, August 2004.
    • (2004)
    • Wolkerstorfer, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.