메뉴 건너뛰기




Volumn , Issue , 2008, Pages 97-104

EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; BLOOD VESSEL PROSTHESES; CLONING; ELECTRIC CONDUCTIVITY MEASUREMENT; GENETIC ENGINEERING; LAWS AND LEGISLATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 49049105964     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2008.4519370     Document Type: Conference Paper
Times cited : (117)

References (25)
  • 3
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • V. Shoup, editor, Advances in Cryptology, Proceedings of CRYPTO, of, Springer Verlag
    • A. Juels and S. A.Weis. Authenticating pervasive devices with human protocols. In V. Shoup, editor, Advances in Cryptology, Proceedings of CRYPTO 2005, volume 3621 of LNCS, pages 293-308. Springer Verlag, 2005.
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 4
    • 84957018842 scopus 로고    scopus 로고
    • Low Cost Attacks on Tamper Resistant Devices
    • B. Christianson, B. Crispo, T.M.A. Lomas and M. Roe, editors, Proceedings of the 5th International Workshop on Security Protocols, of, Springer Verlag
    • R. Anderson and M. Kuhn. Low Cost Attacks on Tamper Resistant Devices. In B. Christianson, B. Crispo, T.M.A. Lomas and M. Roe, editors, Proceedings of the 5th International Workshop on Security Protocols, volume 1361 of LNCS , pages 125-136. Springer Verlag, 1997.
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 9
    • 49049113848 scopus 로고    scopus 로고
    • M. Ohkubo, K. Suzuki and S. Kinoshita. Cryptographic Approach to Privacy-Friendly Tags. RFID Privacy Workshop @ MIT, 2003.
    • M. Ohkubo, K. Suzuki and S. Kinoshita. Cryptographic Approach to "Privacy-Friendly" Tags. RFID Privacy Workshop @ MIT, 2003.
  • 11
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems using the AES Algorithm
    • M. Joye and J. J. Quisquater, editors, Cryptographic Hardware and Embedded Systems CHES, of, Springer Verlag
    • M. Feldhofer, S. Dominikus and J. Wolkerstorfer. Strong Authentication for RFID Systems using the AES Algorithm.. In M. Joye and J. J. Quisquater, editors, Cryptographic Hardware and Embedded Systems (CHES), volume 3156 of LNCS, pages 357-370. Springer Verlag, 2004.
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 16
    • 34548353243 scopus 로고    scopus 로고
    • Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags'?
    • Graz, Austria, August
    • J. Wolkerstorfer. Is Elliptic-Curve Cryptography Suitable to Secure RFID Tags'? Workshop on RFID and Light-weight Cryptography, Graz, Austria, August 2005.
    • (2005) Workshop on RFID and Light-weight Cryptography
    • Wolkerstorfer, J.1
  • 17
    • 33745654539 scopus 로고    scopus 로고
    • P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, 3860 of LNCS, pages 115-131. Springer Verlag, February 13-17 2006.
    • P. Tuyls and L. Batina. RFID-tags for Anti-Counterfeiting. In D. Pointcheval, editor, Topics in Cryptology - CT-RSA 2006, volume 3860 of LNCS, pages 115-131. Springer Verlag, February 13-17 2006.
  • 19
    • 0000537828 scopus 로고
    • Efficient Identification and Signatures for Smart Cards
    • Gilles Brassard, editor, Advances in Cryptology, CRYPTO '89, of, Springer Verlag
    • C.-P. Schnorr. Efficient Identification and Signatures for Smart Cards. In Gilles Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of LNCS, pages 239-252. Springer Verlag, 1989.
    • (1989) LNCS , vol.435 , pp. 239-252
    • Schnorr, C.-P.1
  • 20
    • 84875762817 scopus 로고
    • Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
    • E. F. Brickell, editor, Advances in Cryptology, CRYPTO'92, of, Springer Verlag
    • T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In E. F. Brickell, editor, Advances in Cryptology - CRYPTO'92, volume 740 of LNCS, pages 31-53. Springer Verlag, 1992.
    • (1992) LNCS , vol.740 , pp. 31-53
    • Okamoto, T.1
  • 21
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • W. Fumy, editor, Eurocrypt '97, of, Springer
    • V. Shoup. Lower bounds for discrete logarithms and related problems. In W. Fumy, editor, Eurocrypt '97, volume 1233 of LNCS, pages 256-266. Springer, 1997.
    • (1997) LNCS , vol.1233 , pp. 256-266
    • Shoup, V.1
  • 22
    • 33646832943 scopus 로고    scopus 로고
    • Abstract models of computation in cryptography
    • 10th IMA Conference On Cryptography and Coding, Springer-Verlag
    • U. Maurer. Abstract models of computation in cryptography. In 10th IMA Conference On Cryptography and Coding, volume 2796of LNCS, pages 1-12. Springer-Verlag, 2005.
    • (2005) LNCS , vol.2796 of , pp. 1-12
    • Maurer, U.1
  • 23
    • 57049170893 scopus 로고    scopus 로고
    • The hardness of the DHK problem in the generic group model. Cryptology ePrint Archive
    • Report 2006/156
    • A. W. Dent. The hardness of the DHK problem in the generic group model. Cryptology ePrint Archive, Report 2006/156.
    • Dent, A.W.1
  • 24
    • 49049092762 scopus 로고    scopus 로고
    • ANSI X9.42-2003 Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, American National Standards Insti-tute, 2003.
    • ANSI X9.42-2003 Public Key Cryptography for the Financial Services Industry: Agreement of Symmetric Keys Using Discrete Logarithm Cryptography, American National Standards Insti-tute, 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.