-
1
-
-
54349092113
-
-
EPCglobal, http://www.epcglobalinc.org/. [Online]. Available: http://www.epcglobalinc.org/.
-
EPCglobal, http://www.epcglobalinc.org/. [Online]. Available: http://www.epcglobalinc.org/.
-
-
-
-
2
-
-
54349104747
-
-
ISO-Internacional Organization for Standardization, http://www.iso.org/. [Online]. Available: http://www.iso.org/.
-
ISO-Internacional Organization for Standardization, http://www.iso.org/. [Online]. Available: http://www.iso.org/.
-
-
-
-
3
-
-
54349095694
-
-
Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2", http://www.epcglobalinc.org/, January 2005. [Online]. Available: http://www.epcglobalinc.org/.
-
Class-1 Generation-2 UHF air interface protocol standard version 1.0.9: "Gen 2", http://www.epcglobalinc.org/, January 2005. [Online]. Available: http://www.epcglobalinc.org/.
-
-
-
-
4
-
-
54349115976
-
-
D. Bailey, A. Juels, Shoehorning security into the EPC standard, Manuscript in submission, 2006.
-
D. Bailey, A. Juels, Shoehorning security into the EPC standard, Manuscript in submission, 2006.
-
-
-
-
5
-
-
33845415153
-
Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems
-
Hyun Kim K., Young Choi E., Mi Lee S., and Hoon Lee D. Secure EPCglobal Class-1 Gen-2 RFID system against security and privacy problems. Proc. of OTM-IS'06, ser. LNC vol. 4277 (2006) 362-371
-
(2006)
Proc. of OTM-IS'06, ser. LNC
, vol.4277
, pp. 362-371
-
-
Hyun Kim, K.1
Young Choi, E.2
Mi Lee, S.3
Hoon Lee, D.4
-
8
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Weis S., Sarma S., Rivest R., and Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Proc. of Security in Pervasive Comp., ser. LNCS vol. 2802 (2004) 201-212
-
(2004)
Proc. of Security in Pervasive Comp., ser. LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
9
-
-
14844294769
-
Privacy and security in library RFID: Issues, practices, and architectures
-
Molnar D., and Wagner D. Privacy and security in library RFID: Issues, practices, and architectures. Proc. of ACM CCS'04 (2004) 210-219
-
(2004)
Proc. of ACM CCS'04
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
11
-
-
54349126955
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. Proc. of PerCom'06 (2006)
-
(2006)
Proc. of PerCom'06
-
-
Dimitriou, T.1
-
13
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Rhee K., Kwak J., Kim S., and Won D. Challenge-response based RFID authentication protocol for distributed database environment. Proc. of SPC'05, ser. LNCS vol. 3450 (2005) 70-84
-
(2005)
Proc. of SPC'05, ser. LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
14
-
-
85019495228
-
YA-TRAP: yet another trivial RFID authentication protocol
-
Tsudik G. YA-TRAP: yet another trivial RFID authentication protocol. Proc. of PerCom'06 (2006)
-
(2006)
Proc. of PerCom'06
-
-
Tsudik, G.1
-
15
-
-
54349102362
-
-
ISO/IEC 18000-6:2004/Amd:2006, http://www.iso.org/, 2006.
-
ISO/IEC 18000-6:2004/Amd:2006, http://www.iso.org/, 2006.
-
-
-
-
17
-
-
54349098793
-
EPC Generation 2: Everything you need to know
-
Roberti M., Vice K.A., Marguire Y., Reynolds M., and Dunn R. EPC Generation 2: Everything you need to know. RFID Journal Webinars, Technical Report (2005)
-
(2005)
RFID Journal Webinars, Technical Report
-
-
Roberti, M.1
Vice, K.A.2
Marguire, Y.3
Reynolds, M.4
Dunn, R.5
-
18
-
-
0012694899
-
Evolving a computer program to generate random number using the genetic programming paradigm
-
Morgan Kaufmann
-
Koza J. Evolving a computer program to generate random number using the genetic programming paradigm. Proc. of the 4th Int. Conference on Genetic Algorithms (1991), Morgan Kaufmann 37-44
-
(1991)
Proc. of the 4th Int. Conference on Genetic Algorithms
, pp. 37-44
-
-
Koza, J.1
-
19
-
-
54349115005
-
-
The lil-gp genetic programming system, http://garage.cps.msu.edu/software/lil-gp/lilgpindex.html.
-
The lil-gp genetic programming system, http://garage.cps.msu.edu/software/lil-gp/lilgpindex.html.
-
-
-
-
20
-
-
33745791751
-
Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
-
Lohmmann T., Schneider M., and Ruland C. Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags. Proc. of Cardis'06, ser. LNCS vol. 3928 (2006) 278-288
-
(2006)
Proc. of Cardis'06, ser. LNCS
, vol.3928
, pp. 278-288
-
-
Lohmmann, T.1
Schneider, M.2
Ruland, C.3
-
21
-
-
85011285633
-
The strict avalanche criterion: Spectral properties of boolean functions and an extended definition
-
Forré R. The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. Proc. of Crypto'88, ser. LNCS (1990) 450-468
-
(1990)
Proc. of Crypto'88, ser. LNCS
, pp. 450-468
-
-
Forré, R.1
-
22
-
-
0031599142
-
Mersenne twister: A 623-dimensionally equidistributed uniform PRNG
-
Matsumoto M., et al. Mersenne twister: A 623-dimensionally equidistributed uniform PRNG. ACM Trans. Model. Comput. Simul. 8 1 (1998) 3-30
-
(1998)
ACM Trans. Model. Comput. Simul.
, vol.8
, Issue.1
, pp. 3-30
-
-
Matsumoto, M.1
-
24
-
-
0003822632
-
A statistical test suite for random and pseudorandom number generators for cryptographic applications
-
http://csrc.nist.gov/rng/
-
Rukhin A., Soto J., Nechvatal J., Smid M., Barker E., Leigh S., Levenson M., Vangel M., Banks D., Heckert A., Dray J., and Vo S. A statistical test suite for random and pseudorandom number generators for cryptographic applications,. http://csrc.nist.gov/rng/. Technical Report (2001)
-
(2001)
Technical Report
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
26
-
-
0347666758
-
Some difficult-to-pass tests of randomness
-
Marsaglia G., and Tsang W. Some difficult-to-pass tests of randomness. J. Stat. Softw. 7 3 (2002)
-
(2002)
J. Stat. Softw.
, vol.7
, Issue.3
-
-
Marsaglia, G.1
Tsang, W.2
-
29
-
-
85025704284
-
Linear cryptanalysis method for DES cipher
-
Matsui M. Linear cryptanalysis method for DES cipher. Proc. Of EUROCRYPT'93 (1994) 386-397
-
(1994)
Proc. Of EUROCRYPT'93
, pp. 386-397
-
-
Matsui, M.1
-
31
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Feldhofer M., Dominikus S., and Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm. Proc. of Ches'04 vol. 3156 (2004) 357-370
-
(2004)
Proc. of Ches'04
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
33
-
-
50649121469
-
State of the art in hardware architectures
-
Feldhofer M., Lemke K., Oswald E., Standaert F., Wollinger T., and Wolkerstorfer J. State of the art in hardware architectures. Technical report, ECRYPT Network of Excellence in Cryptology (2005)
-
(2005)
Technical report, ECRYPT Network of Excellence in Cryptology
-
-
Feldhofer, M.1
Lemke, K.2
Oswald, E.3
Standaert, F.4
Wollinger, T.5
Wolkerstorfer, J.6
-
38
-
-
54349125978
-
-
C. de Canniere, B. Preneel, Trivium specifications, http://www.ecrypt.eu.org/ stream/.
-
C. de Canniere, B. Preneel, Trivium specifications, http://www.ecrypt.eu.org/ stream/.
-
-
-
-
40
-
-
54349090150
-
-
O. Kucuk, Slide resynchronization attack on the initialization of grain 1.0, http://www.ecrypt.eu.org/ stream/.
-
O. Kucuk, Slide resynchronization attack on the initialization of grain 1.0, http://www.ecrypt.eu.org/ stream/.
-
-
-
|