메뉴 건너뛰기




Volumn 31, Issue 1, 2009, Pages 88-97

LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification

Author keywords

EPC; Lightweight cryptography; PRNG; RFID; Security

Indexed keywords

CRYPTOGRAPHY; MOBILE PHONES; RADIO NAVIGATION;

EID: 54349101762     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2007.11.013     Document Type: Article
Times cited : (90)

References (40)
  • 1
    • 54349092113 scopus 로고    scopus 로고
    • EPCglobal, http://www.epcglobalinc.org/. [Online]. Available: http://www.epcglobalinc.org/.
    • EPCglobal, http://www.epcglobalinc.org/. [Online]. Available: http://www.epcglobalinc.org/.
  • 2
    • 54349104747 scopus 로고    scopus 로고
    • ISO-Internacional Organization for Standardization, http://www.iso.org/. [Online]. Available: http://www.iso.org/.
    • ISO-Internacional Organization for Standardization, http://www.iso.org/. [Online]. Available: http://www.iso.org/.
  • 3
    • 54349095694 scopus 로고    scopus 로고
    • Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2", http://www.epcglobalinc.org/, January 2005. [Online]. Available: http://www.epcglobalinc.org/.
    • Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2", http://www.epcglobalinc.org/, January 2005. [Online]. Available: http://www.epcglobalinc.org/.
  • 4
    • 54349115976 scopus 로고    scopus 로고
    • D. Bailey, A. Juels, Shoehorning security into the EPC standard, Manuscript in submission, 2006.
    • D. Bailey, A. Juels, Shoehorning security into the EPC standard, Manuscript in submission, 2006.
  • 5
    • 33845415153 scopus 로고    scopus 로고
    • Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems
    • Hyun Kim K., Young Choi E., Mi Lee S., and Hoon Lee D. Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems. Proc. of OTM-IS'06, ser. LNC vol. 4277 (2006) 362-371
    • (2006) Proc. of OTM-IS'06, ser. LNC , vol.4277 , pp. 362-371
    • Hyun Kim, K.1    Young Choi, E.2    Mi Lee, S.3    Hoon Lee, D.4
  • 9
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Molnar D., and Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. Proc. of ACM CCS'04 (2004) 210-219
    • (2004) Proc. of ACM CCS'04 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 11
    • 54349126955 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. Proc. of PerCom'06 (2006)
    • (2006) Proc. of PerCom'06
    • Dimitriou, T.1
  • 13
    • 24644501824 scopus 로고    scopus 로고
    • Challenge-response based RFID authentication protocol for distributed database environment
    • Rhee K., Kwak J., Kim S., and Won D. Challenge-response based RFID authentication protocol for distributed database environment. Proc. of SPC'05, ser. LNCS vol. 3450 (2005) 70-84
    • (2005) Proc. of SPC'05, ser. LNCS , vol.3450 , pp. 70-84
    • Rhee, K.1    Kwak, J.2    Kim, S.3    Won, D.4
  • 14
    • 85019495228 scopus 로고    scopus 로고
    • YA-TRAP: yet another trivial RFID authentication protocol
    • Tsudik G. YA-TRAP: yet another trivial RFID authentication protocol. Proc. of PerCom'06 (2006)
    • (2006) Proc. of PerCom'06
    • Tsudik, G.1
  • 15
    • 54349102362 scopus 로고    scopus 로고
    • ISO/IEC 18000-6:2004/Amd:2006, http://www.iso.org/, 2006.
    • ISO/IEC 18000-6:2004/Amd:2006, http://www.iso.org/, 2006.
  • 18
    • 0012694899 scopus 로고
    • Evolving a computer program to generate random number using the genetic programming paradigm
    • Morgan Kaufmann
    • Koza J. Evolving a computer program to generate random number using the genetic programming paradigm. Proc. of the 4th Int. Conference on Genetic Algorithms (1991), Morgan Kaufmann 37-44
    • (1991) Proc. of the 4th Int. Conference on Genetic Algorithms , pp. 37-44
    • Koza, J.1
  • 19
    • 54349115005 scopus 로고    scopus 로고
    • The lil-gp genetic programming system, http://garage.cps.msu.edu/software/lil-gp/lilgpindex.html.
    • The lil-gp genetic programming system, http://garage.cps.msu.edu/software/lil-gp/lilgpindex.html.
  • 20
    • 33745791751 scopus 로고    scopus 로고
    • Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
    • Lohmmann T., Schneider M., and Ruland C. Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags. Proc. of Cardis'06, ser. LNCS vol. 3928 (2006) 278-288
    • (2006) Proc. of Cardis'06, ser. LNCS , vol.3928 , pp. 278-288
    • Lohmmann, T.1    Schneider, M.2    Ruland, C.3
  • 21
    • 85011285633 scopus 로고
    • The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
    • Forré R. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. Proc. of Crypto'88, ser. LNCS (1990) 450-468
    • (1990) Proc. of Crypto'88, ser. LNCS , pp. 450-468
    • Forré, R.1
  • 22
    • 0031599142 scopus 로고    scopus 로고
    • Mersenne twister: A 623-dimensionally equidistributed uniform PRNG
    • Matsumoto M., et al. Mersenne twister: A 623-dimensionally equidistributed uniform PRNG. ACM Trans. Model. Comput. Simul. 8 1 (1998) 3-30
    • (1998) ACM Trans. Model. Comput. Simul. , vol.8 , Issue.1 , pp. 3-30
    • Matsumoto, M.1
  • 23
  • 26
    • 0347666758 scopus 로고    scopus 로고
    • Some difficult-to-pass tests of randomness
    • Marsaglia G., and Tsang W. Some difficult-to-pass tests of randomness. J. Stat. Softw. 7 3 (2002)
    • (2002) J. Stat. Softw. , vol.7 , Issue.3
    • Marsaglia, G.1    Tsang, W.2
  • 29
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • Matsui M. Linear cryptanalysis method for DES cipher. Proc. Of EUROCRYPT'93 (1994) 386-397
    • (1994) Proc. Of EUROCRYPT'93 , pp. 386-397
    • Matsui, M.1
  • 31
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Feldhofer M., Dominikus S., and Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Proc. of Ches'04 vol. 3156 (2004) 357-370
    • (2004) Proc. of Ches'04 , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 38
    • 54349125978 scopus 로고    scopus 로고
    • C. de Canniere, B. Preneel, Trivium specifications, http://www.ecrypt.eu.org/ stream/.
    • C. de Canniere, B. Preneel, Trivium specifications, http://www.ecrypt.eu.org/ stream/.
  • 40
    • 54349090150 scopus 로고    scopus 로고
    • O. Kucuk, Slide resynchronization attack on the initialization of grain 1.0, http://www.ecrypt.eu.org/ stream/.
    • O. Kucuk, Slide resynchronization attack on the initialization of grain 1.0, http://www.ecrypt.eu.org/ stream/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.