-
2
-
-
47049124708
-
-
EPCglobal Inc. home
-
EPCglobal Inc. home page, http://www.epcglobalinc.org.
-
-
-
-
3
-
-
84897458412
-
-
EPCglobal Inc
-
EPCglobal Inc., Specification for RFID air interface, http://www.epcglobalinc.org/standards_technology/ EPCglobal2UHFRFIDProtocolV109122005
-
Specification for RFID air interface
-
-
-
4
-
-
47049086704
-
A Distributed Architecture for a Ubiquitous Item Identification Network
-
Japan, September
-
D. C Ranasinghe, K. Seong, M. Leng, D. W. Engels, and P. H. Cole, "A Distributed Architecture for a Ubiquitous Item Identification Network", Smart Object Systems Workshop, Japan, September 2005.
-
(2005)
Smart Object Systems Workshop
-
-
Ranasinghe, D.C.1
Seong, K.2
Leng, M.3
Engels, D.W.4
Cole, P.H.5
-
5
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID Device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin and M. Szydlo, "Security analysis of a cryptographically-enabled RFID Device", Proceedings of 14th USENIX Secuirty Symposium, pp. 1-16.
-
Proceedings of 14th USENIX Secuirty Symposium
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
7
-
-
34547645950
-
Power analysis of RFID Tags
-
unpublished, accessed on March
-
Y. Oren, and A. Shamir, "Power analysis of RFID Tags", unpublished, accessed on March 2006, http://www.wisdom.weizmann.ac.il/~yossio/ rfid/.
-
(2006)
-
-
Oren, Y.1
Shamir, A.2
-
9
-
-
68549104046
-
Physical security devices for computer subsystems: A Survey of Attacks and Defences. Workshop on Cryptographic Hardware and Embedded Systems
-
Weigart, S.H., "Physical security devices for computer subsystems: A Survey of Attacks and Defences". Workshop on Cryptographic Hardware and Embedded Systems, LNCS, vol. 1965, pages 302-317.
-
LNCS
, vol.1965
, pp. 302-317
-
-
Weigart, S.H.1
-
10
-
-
0000694402
-
Low cost attacks on tamper resistant devices
-
International Workshop on Security Protocols
-
Andreson, R, and Kuhn, M., "Low cost attacks on tamper resistant devices", International Workshop on Security Protocols, LNCS, 1997.
-
(1997)
LNCS
-
-
Andreson, R.1
Kuhn, M.2
-
11
-
-
47049096978
-
invited talk on smartcard security
-
E Bovenlander, invited talk on smartcard security, Eurocrypt 97, 1997.
-
(1997)
Eurocrypt
, vol.97
-
-
Bovenlander, E.1
-
15
-
-
0037952426
-
Physical one-way functions
-
Ph.D dissertation, Department of Media and Art Science, Massachusetts Institute of Technology, Cambridge
-
P. S. Ravikanth "Physical one-way functions", Ph.D dissertation, Department of Media and Art Science, Massachusetts Institute of Technology, Cambridge, 2001.
-
(2001)
-
-
Ravikanth, P.S.1
-
16
-
-
0037144430
-
Physical one-way functions
-
R. Pappu, B. Recht, J. Taylor, and N Gershen-Feld, "Physical one-way functions," Science, vol. 297, pp. 2026-2030, 2002.
-
(2002)
Science
, vol.297
, pp. 2026-2030
-
-
Pappu, R.1
Recht, B.2
Taylor, J.3
Gershen-Feld, N.4
-
17
-
-
0038341105
-
Silicon physical random functions
-
Nov
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas, "Silicon physical random functions", proc. of computer communications security conf., Nov. 2002. pp. 148-160.
-
(2002)
proc. of computer communications security conf
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
van Dijk, M.3
Devadas, S.4
-
18
-
-
31144476821
-
Extracting Secret Keys from Integrated Circuits
-
D. Lim, J. W. Lee, B. Gassend, G.E. Suh, M. van Dijk, S. Devadas, "Extracting Secret Keys from Integrated Circuits", IEEE Transactions on VLSI Sytems,vol. 13, No. 10, 2005.
-
(2005)
IEEE Transactions on VLSI Sytems
, vol.13
, Issue.10
-
-
Lim, D.1
Lee, J.W.2
Gassend, B.3
Suh, G.E.4
van Dijk, M.5
Devadas, S.6
-
19
-
-
84974670663
-
The shrinking generator
-
D.R. Stinson, editor, Springer-Verlag, New York
-
Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator", D.R. Stinson, editor, Advances in Crytplogy - Crypto '93, pp 22-39, Springer-Verlag, New York, 1994.
-
(1994)
Advances in Crytplogy - Crypto '93
, pp. 22-39
-
-
Coppersmith, H.K.1
Mansour, Y.2
-
20
-
-
84956857565
-
A probabilistic correlation attack on the shrinking generator
-
Proc. ACISP '98, 1438, pp, Springer Verlat
-
L. Simpson, J.D. Golic, and E. Dawson, "A probabilistic correlation attack on the shrinking generator," Proc. ACISP '98, LNCS vol. 1438, pp. 147-158, Springer Verlat, 1998.
-
(1998)
LNCS
, pp. 147-158
-
-
Simpson, L.1
Golic, J.D.2
Dawson, E.3
-
21
-
-
84955620884
-
A cryptanalysis of clock-controlled shift registers with multiple steps
-
J. D. Golic and L. O'Connor, "A cryptanalysis of clock-controlled shift registers with multiple steps", Cryptography: Policy and Algorithms, pp. 174-184, 1995.
-
(1995)
Cryptography: Policy and Algorithms
, pp. 174-184
-
-
Golic, J.D.1
O'Connor, L.2
-
22
-
-
84947776392
-
Reduces complexity correlation attacks on two clock-controlled generators
-
Proc. Asiacrypt'98, 1541, pp, Springer-Verlag
-
T. Johansson, "Reduces complexity correlation attacks on two clock-controlled generators," Proc. Asiacrypt'98, LNCS, vol 1541, pp. 342-356, Springer-Verlag, 1998.
-
(1998)
LNCS
, pp. 342-356
-
-
Johansson, T.1
-
23
-
-
35248859228
-
Predicting the shrinking generator with fixed connections
-
proc. Eurocrypt'03, Springer Verlag
-
P. Ekdahl, W. Meier, and T. Johansson, "Predicting the shrinking generator with fixed connections," proc. Eurocrypt'03, LNCS, vol. 2656, pp. 345-359, Springer Verlag, 2004.
-
(2004)
LNCS
, vol.2656
, pp. 345-359
-
-
Ekdahl, P.1
Meier, W.2
Johansson, T.3
-
24
-
-
33646763858
-
Using linear hybrid cellular automata to attack the shrinking generator
-
May
-
P. Caballero-Gil, and A. Fuster-Sabater, "Using linear hybrid cellular automata to attack the shrinking generator", IEICE Trans. Fundamentals, vol. E90-A, no. 5, pp. 1166-1172, May 2006.
-
(2006)
IEICE Trans. Fundamentals
, vol.E90-A
, Issue.5
, pp. 1166-1172
-
-
Caballero-Gil, P.1
Fuster-Sabater, A.2
-
25
-
-
47049093398
-
Buffer length and clock rate for the shrinking generator
-
RC 19938 88322, 1995
-
I. Kessler, and H. Krawczyk, "Buffer length and clock rate for the shrinking generator", IBM Research Report, RC 19938 (88322), 1995.
-
IBM Research Report
-
-
Kessler, I.1
Krawczyk, H.2
-
26
-
-
28844435788
-
Security and Privacy Solutions for Low Cost RFID Systems
-
Melbourne, Australia, pp, 14-17 December
-
D. Ranasinghe, D. W. Engels, P. H. Cole, "Security and Privacy Solutions for Low Cost RFID Systems", Proc. of the 2004 Intelligent Sensors, Sensor Networks & Information Processing Conference, Melbourne, Australia, pp. 337-342, 14-17 December, 2004.
-
(2004)
Proc. of the 2004 Intelligent Sensors, Sensor Networks & Information Processing Conference
, pp. 337-342
-
-
Ranasinghe, D.1
Engels, D.W.2
Cole, P.H.3
|