메뉴 건너뛰기




Volumn , Issue , 2008, Pages

On the authentication of RFID systems with bitwise operations

Author keywords

Active adversary; Authentication; Bitwise operations; Low cost computing

Indexed keywords

ACTIVE ADVERSARY; AUTHENTICATION PROTOCOLS; BITWISE OPERATIONS; COMPUTATIONAL CAPABILITIES; LIGHTWEIGHT AUTHENTICATION PROTOCOLS; LOW-COST COMPUTING; PROTOCOL DESIGNERS; RFID SYSTEMS; RFID TAGS;

EID: 58049165558     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2008.ECP.74     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
  • 4
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Springer
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," in Advances in Cryptology-CRYPTO, vol. 773. Springer, 1993, pp. 232-249.
    • (1993) Advances in Cryptology-CRYPTO , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 7
    • 33745181952 scopus 로고    scopus 로고
    • A. Juels and S. Weis, Authenticating pervasive devices with human protocols, in Advances in Cryptology - CRYPTO'05, ser. Lecture Notes in Computer Science, V. Shoup, Ed., 3126, IACR. Santa Barbara, California, USA: Springer-Verlag, August 2005, pp. 293-308.
    • A. Juels and S. Weis, "Authenticating pervasive devices with human protocols," in Advances in Cryptology - CRYPTO'05, ser. Lecture Notes in Computer Science, V. Shoup, Ed., vol. 3126, IACR. Santa Barbara, California, USA: Springer-Verlag, August 2005, pp. 293-308.
  • 9
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • International Conference on Ubiquitous Intelligence and Computing, UIC06, Springer-Verlag, September
    • _, "M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags," in International Conference on Ubiquitous Intelligence and Computing - UIC06, ser. Lecture Notes in Computer Science, vol. 4159. Springer-Verlag, September 2006, pp. 912-923.
    • (2006) ser. Lecture Notes in Computer Science , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.3    Ribagorda, A.4
  • 10
    • 33845455482 scopus 로고    scopus 로고
    • EMAP: An efficient mutual authentication protocol for low-cost RFID tags
    • OTM Federated Conferences and Workshop: IS Workshop, IS'06, Springer-Verlag, November
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An efficient mutual authentication protocol for low-cost RFID tags." in OTM Federated Conferences and Workshop: IS Workshop - IS'06, ser. Lecture Notes in Computer Science, vol. 4277. Springer-Verlag, November 2006, pp. 352-361.
    • (2006) ser. Lecture Notes in Computer Science , vol.4277 , pp. 352-361
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 11
    • 35248872610 scopus 로고    scopus 로고
    • S. Sarma, S. Weis, and D. Engels, RFID systems and security and privacy implications, in Cryptographic Hardware and Embedded Systems - CHES 2002, ser. Lecture Notes in Computer Science, B. Kaliski, c. Kaya ço, and C. Paar, Eds., 2523. Redwood Shores, CA, USA: Springer-Verlag, August 2002, pp. 454-469.
    • S. Sarma, S. Weis, and D. Engels, "RFID systems and security and privacy implications," in Cryptographic Hardware and Embedded Systems - CHES 2002, ser. Lecture Notes in Computer Science, B. Kaliski, c. Kaya ço, and C. Paar, Eds., vol. 2523. Redwood Shores, CA, USA: Springer-Verlag, August 2002, pp. 454-469.
  • 13
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology, ASIACRYPT 2001, Springer
    • N. Hopper and M. Blum, "Secure human identification protocols," in Advances in Cryptology - ASIACRYPT 2001, ser. Lecture Notes in Computer Science, vol. 2248/2001. Springer, 2001.
    • (2001) ser. Lecture Notes in Computer Science , vol.2248
    • Hopper, N.1    Blum, M.2
  • 15
    • 0000097412 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Springer
    • A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances in Cryptology-CRYPTO, vol. 86. Springer, 1986, pp. 186-194.
    • (1986) Advances in Cryptology-CRYPTO , vol.86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 57849147967 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • Sandton, Gauteng, South Africa: IFIP, May
    • T. Li and G. Wang, "Security analysis of two ultra-lightweight RFID authentication protocols," in IFIP SEC 2007. Sandton, Gauteng, South Africa: IFIP, May 2007.
    • (2007) IFIP SEC 2007
    • Li, T.1    Wang, G.2
  • 19
    • 38149037913 scopus 로고    scopus 로고
    • B. Alomair, L. Lazos, and R. Poovendran, Passive attacks on a class of authentication protocols for RFID, in International Conference on Information Security and Cryptology - ICISC, ser. Lecture Notes in Computer Science, K.-H. Nam and G. Rhee, Eds., 4817. Seoul, Korea: Springer-Verlag, November 2007, pp. 102-115.
    • B. Alomair, L. Lazos, and R. Poovendran, "Passive attacks on a class of authentication protocols for RFID," in International Conference on Information Security and Cryptology - ICISC, ser. Lecture Notes in Computer Science, K.-H. Nam and G. Rhee, Eds., vol. 4817. Seoul, Korea: Springer-Verlag, November 2007, pp. 102-115.
  • 22
    • 35048859848 scopus 로고    scopus 로고
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong authentication for RFID systems using the AES algorithm, in Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., 3156, IACR. Boston, Massachusetts, USA: Springer-Verlag, August 2004, pp. 357-370.
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Workshop on Cryptographic Hardware and Embedded Systems - CHES 2004, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., vol. 3156, IACR. Boston, Massachusetts, USA: Springer-Verlag, August 2004, pp. 357-370.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.