-
1
-
-
47849127659
-
-
RSA Hardware implementation, August
-
RSA Hardware implementation, Version-1, August, http://islab.oregonstate. edu/papers/r02rsahw.pdf
-
Version-1
-
-
-
2
-
-
84944878354
-
-
th print, August, 2001
-
th print, August, 2001
-
-
-
-
3
-
-
79956140310
-
-
Nadia Nedjah and Luiza de Macedo Mourelle, Three Hardware Implementations for the Binary Modular Exponentiation: Sequential, Parallel and Systolic Proceedings of the 15th Symposium on Computer Architecture and High Performance Computing (SBACPAD'03), 2003, IEEE
-
Nadia Nedjah and Luiza de Macedo Mourelle, "Three Hardware Implementations for the Binary Modular Exponentiation: Sequential, Parallel and Systolic" Proceedings of the 15th Symposium on Computer Architecture and High Performance Computing (SBACPAD'03), 2003, IEEE
-
-
-
-
4
-
-
77956052389
-
A Scalable Architecture for Montgomery Multiplication
-
Cryptographic Hardware and Embedded Systems, CHES 99, Springer-Verlag
-
Alexandre F. Tenca and Cetin K. Koc, "A Scalable Architecture for Montgomery Multiplication", Cryptographic Hardware and Embedded Systems, CHES 99, Lecture Notes in Computer Science, No. 1717, pages 94, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, Issue.1717
, pp. 94
-
-
Tenca, A.F.1
Koc, C.K.2
-
5
-
-
2942614621
-
Security and Privacy in Radio-Frequency Identification Devices
-
Master's thesis, MIT
-
S. Weis, "Security and Privacy in Radio-Frequency Identification Devices", Master's thesis, MIT, 2003.
-
(2003)
-
-
Weis, S.1
-
6
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, "Mutual authentication protocol for low-cost RFID", Encrypt Workshop on RFID and Lightweight Crypto, 2005.
-
(2005)
Encrypt Workshop on RFID and Lightweight Crypto
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
-
7
-
-
24944582157
-
Efficient authentication for low-cost RFID systems
-
Proc. of ICCSA'05, of, Springer-Verlag
-
S.M. Lee, Y.J. Hwang, D.H. Lee, and J.I.L. Lim, "Efficient authentication for low-cost RFID systems", In Proc. of ICCSA'05, volume 3480 of LNCS, pages 619-627, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3480
, pp. 619-627
-
-
Lee, S.M.1
Hwang, Y.J.2
Lee, D.H.3
Lim, J.I.L.4
-
8
-
-
36248971663
-
Security - RFIDSec 06
-
printed handout of Workshop on RFID, July
-
Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan Estevez-Tapiador, and Arturo Ribagorda, "LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags" printed handout of Workshop on RFID, Security - RFIDSec 06, July 2006.
-
(2006)
-
-
Peris-Lopez, P.1
Cesar, J.2
Hernandez-Castro, J.E.-T.3
Ribagorda, A.4
-
9
-
-
2942625823
-
-
D. Henrici and P. Muller, Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers In Proc. of PERSEC'04, pages 149-153, IEEE Computer Society, 2004.
-
D. Henrici and P. Muller, "Hash-based enhancement of location privacy for radiofrequency identification devices using varying identifiers" In Proc. of PERSEC'04, pages 149-153, IEEE Computer Society, 2004.
-
-
-
-
10
-
-
24944575863
-
Cryptographic approach to "privacy-friendly" tags
-
MIT, MA, USA, November
-
Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita, "Cryptographic approach to "privacy-friendly" tags" In RFID Privacy Workshop, MIT, MA, USA, November 2003.
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
11
-
-
33645857377
-
Cryptography and authentication on RFID passive tags for apparel products
-
May
-
Kirk H.M. Wong, Patrick C.L. Hui, Allan C.K. Chan "Cryptography and authentication on RFID passive tags for apparel products", Computers in Industry, Volume 57, Issue 4, Pages 342-349, May 2006.
-
(2006)
Computers in Industry
, vol.57
, Issue.4
, pp. 342-349
-
-
Wong, K.H.M.1
Hui, P.C.L.2
Chan, A.C.K.3
-
12
-
-
47849119028
-
-
G. Avoine, Adversarial model for radio frequency identification, 2005, Cryptology ePrint Archive, Report 2005/049, Referenced 2006 at http://eprint.iacr.org.
-
G. Avoine, "Adversarial model for radio frequency identification", 2005, Cryptology ePrint Archive, Report 2005/049, Referenced 2006 at http://eprint.iacr.org.
-
-
-
-
13
-
-
26444478592
-
RFID traceability: A multilayer problem
-
A. Patrick and M. Yung, editors, Financial Cryptography, FC '05, of, Springer-Verlag
-
G. Avoine and P. Oechslin, "RFID traceability: A multilayer problem", In A. Patrick and M. Yung, editors, Financial Cryptography - FC '05, volume 3570 of Lecture Notes in Computer Science, pages 125-140. Springer-Verlag, 2005
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 125-140
-
-
Avoine, G.1
Oechslin, P.2
-
14
-
-
35048859848
-
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Conference of Cryptographic Hardware and Embedded Systems, 2004. Proceedings, pp. 357-370. Springer 2004.
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. "Strong authentication for RFID systems using the AES algorithm." In Conference of Cryptographic Hardware and Embedded Systems, 2004. Proceedings, pp. 357-370. Springer 2004.
-
-
-
|