메뉴 건너뛰기




Volumn 31, Issue 2, 2009, Pages 372-380

Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard

Author keywords

Authentication; Cryptanalysis; EPC C1G2; RFID; Security

Indexed keywords

ACCESS CONTROL; COMPUTER CRIME; CRYPTOGRAPHY; DATABASE SYSTEMS; DIFFRACTIVE OPTICAL ELEMENTS; RADIO NAVIGATION; STANDARDS;

EID: 55749092929     PISSN: 09205489     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.csi.2008.05.012     Document Type: Article
Times cited : (61)

References (31)
  • 2
    • 55749101227 scopus 로고    scopus 로고
    • http://www.woodmann.com/fravia/crctut1.htm
    • Anarchriz. CRC and how to reverse it (1999). http://www.woodmann.com/fravia/crctut1.htm http://www.woodmann.com/fravia/crctut1.htm
    • (1999) CRC and how to reverse it
    • Anarchriz1
  • 5
    • 33751546328 scopus 로고    scopus 로고
    • Elsevier Science Publishers (2)
    • Chien H.-Y., and Chen C.-H. Mutual authentication protocol for RFID conforming to EPC class-1 generation-2 standards. Computer Standards & Interfaces vol. 29 (February 2007), Elsevier Science Publishers 254-259 (2)
    • (2007) Computer Standards & Interfaces , vol.29 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 6
    • 33750082441 scopus 로고    scopus 로고
    • Efficient RFID authentication protocol for ubiquitous computing environment
    • LNCS
    • Choi E.Y., Lee S.M., and Lee D.H. Efficient RFID authentication protocol for ubiquitous computing environment. Proc. of SECUBIQ'05 (2005), LNCS
    • (2005) Proc. of SECUBIQ'05
    • Choi, E.Y.1    Lee, S.M.2    Lee, D.H.3
  • 7
    • 33847330246 scopus 로고    scopus 로고
    • A lightweight RFID protocol to protect against traceability and cloning attacks
    • Dimitriou T. A lightweight RFID protocol to protect against traceability and cloning attacks. In Proc. of SECURECOMM'05 (2005)
    • (2005) In Proc. of SECURECOMM'05
    • Dimitriou, T.1
  • 10
    • 38149047468 scopus 로고    scopus 로고
    • Low-cost and strong- security RFID authentication protocol
    • Proc. of EUC Workshops, Springer
    • Ha J., Moon S.J., Gonzlez Nieto J.M., and Boyd C. Low-cost and strong- security RFID authentication protocol. Proc. of EUC Workshops. LNCS vol. 4809 (2007), Springer 795-807
    • (2007) LNCS , vol.4809 , pp. 795-807
    • Ha, J.1    Moon, S.J.2    Gonzlez Nieto, J.M.3    Boyd, C.4
  • 11
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • IEEE Computer Society
    • Henrici D., and Müller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. Proc. of PERSEC'04 (2004), IEEE Computer Society 149-153
    • (2004) Proc. of PERSEC'04 , pp. 149-153
    • Henrici, D.1    Müller, P.2
  • 14
    • 55749084068 scopus 로고    scopus 로고
    • N. Karten and H. Pltz. Mifare little security, despite obscurity. http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html.
    • N. Karten and H. Pltz. Mifare little security, despite obscurity. http://events.ccc.de/congress/2007/Fahrplan/events/2378.en.html.
  • 15
    • 33745938362 scopus 로고    scopus 로고
    • RFID security without extensive cryptography
    • ACM
    • Karthikeyan S., and Nesterenko M. RFID security without extensive cryptography. Proc. of SASN '05 (2005), ACM 63-67
    • (2005) Proc. of SASN '05 , pp. 63-67
    • Karthikeyan, S.1    Nesterenko, M.2
  • 17
    • 39349089777 scopus 로고    scopus 로고
    • Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme
    • Lim T.L., and Li T. Addressing the weakness in a lightweight RFID tag-reader mutual authentication scheme. Proc. of GLOBECOM'07 (2007)
    • (2007) Proc. of GLOBECOM'07
    • Lim, T.L.1    Li, T.2
  • 20
    • 38149085988 scopus 로고    scopus 로고
    • An efficient authentication protocol in RFID systems resistant to active attacks
    • Proc. of SecUbiq'06, Springer-Verlag
    • Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Ribagorda A. An efficient authentication protocol in RFID systems resistant to active attacks. Proc. of SecUbiq'06. LNCS vol. 4809 (2007), Springer-Verlag 781-794
    • (2007) LNCS , vol.4809 , pp. 781-794
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 21
    • 33750291916 scopus 로고    scopus 로고
    • RFID systems: A survey on security threats and proposed solutions
    • Proc. of PWC06
    • Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Rib- agorda A. RFID systems: A survey on security threats and proposed solutions. Proc. of PWC06. LNCS vol. 4217 (2006) 159-170
    • (2006) LNCS , vol.4217 , pp. 159-170
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Rib- agorda, A.4
  • 22
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • Piramuthu S. Protocols for RFID tag/reader authentication. Decis. support syst. 43 3 (2007) 897-914
    • (2007) Decis. support syst. , vol.43 , Issue.3 , pp. 897-914
    • Piramuthu, S.1
  • 24
    • 47049103630 scopus 로고    scopus 로고
    • Confronting security and privacy threats in modern RFID systems
    • Ranasinghe D.C., and Cole P.H. Confronting security and privacy threats in modern RFID systems. Proc. of ACSSC '06 (2006) 2058-2064
    • (2006) Proc. of ACSSC '06 , pp. 2058-2064
    • Ranasinghe, D.C.1    Cole, P.H.2
  • 25
    • 35248872610 scopus 로고    scopus 로고
    • RFID systems and security and privacy implications
    • Proc. of CHES'02
    • Sarma S., Weis S., and Engels D. RFID systems and security and privacy implications. Proc. of CHES'02. LNCS vol. 2523 (2002) 454-470
    • (2002) LNCS , vol.2523 , pp. 454-470
    • Sarma, S.1    Weis, S.2    Engels, D.3
  • 26
    • 55749116198 scopus 로고    scopus 로고
    • A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proc. of FSE'08, volume In Press of LNCS. Springer-Verlag, in press.
    • A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In Proc. of FSE'08, volume In Press of LNCS. Springer-Verlag, in press.
  • 29
    • 21144438831 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • Proc. of SPC'03
    • Weis S., Sarma S., Rivest R., and Engels D. Security and privacy aspects of low-cost radio frequency identification systems. Proc. of SPC'03. LNCS vol. 2802 (2003) 454-469
    • (2003) LNCS , vol.2802 , pp. 454-469
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 30
    • 55749087538 scopus 로고    scopus 로고
    • http://blog.w-nz.com/archives/2005/07/15/reversing-crc/
    • Westerbaan B. Reversing CRC (2005). http://blog.w-nz.com/archives/2005/07/15/reversing-crc/ http://blog.w-nz.com/archives/2005/07/15/reversing-crc/
    • (2005) Reversing CRC
    • Westerbaan, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.