메뉴 건너뛰기




Volumn , Issue , 2009, Pages 59-68

A low-resource public-key identification scheme for RFID tags and sensor nodes

Author keywords

Hardware implementation; Public key encryption; Rabin encryption; RFID technology

Indexed keywords

HARDWARE IMPLEMENTATION; IDENTIFICATION SCHEME; MEAN CURRENTS; PSEUDORANDOM SEQUENCES; PUBLIC KEY SCHEMES; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION; RABIN ENCRYPTION; RF-ID TAGS; RFID TECHNOLOGY; STREAM CIPHERS;

EID: 70349087741     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1514274.1514283     Document Type: Conference Paper
Times cited : (47)

References (20)
  • 1
    • 33750018373 scopus 로고    scopus 로고
    • Shoehorning security into the EPC tag standard
    • R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, Springer-Verlag GmbH, September
    • D. V. Bailey and A. Juels. Shoehorning security into the EPC tag standard. In R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, LNCS, volume 4116, pages 303-320. Springer-Verlag GmbH, September 2006. http://snurl.com/wiprBJ.
    • (2006) LNCS , vol.4116 , pp. 303-320
    • Bailey, D.V.1    Juels, A.2
  • 2
    • 37149045263 scopus 로고    scopus 로고
    • PRESENT: An ultra-lightweight block cipher
    • P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Springer-Verlag GmbH
    • A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, LNCS, volume 4727, pages 450-466. Springer-Verlag GmbH, 2007. http://snurl.com/wiprBKLPPRSV.
    • (2007) LNCS , vol.4727 , pp. 450-466
    • Bogdanov, A.1    Knudsen, L.R.2    Leander, G.3    Paar, C.4    Poschmann, A.5    Robshaw, M.J.B.6    Seurin, Y.7    Vikkelsoe, C.8
  • 3
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop, Springer-Verlag GmbH, July 2004
    • M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop, LNCS, volume 3156, pages 357-370. Springer-Verlag GmbH, July 2004. http://snurl.com/wiprDFW.
    • LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 4
    • 33845429016 scopus 로고    scopus 로고
    • M. Feldhofer and C. Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In First International OTM Workshop on Information Security (IS'06), Montpellier, France, Oct 30 - Nov 1, 2006. Proceedings, Part I, LNCS, 4277, pages 372-381, Graz, Austria, October 2006. http://snurl.com/wiprFR.
    • M. Feldhofer and C. Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In First International OTM Workshop on Information Security (IS'06), Montpellier, France, Oct 30 - Nov 1, 2006. Proceedings, Part I, LNCS, volume 4277, pages 372-381, Graz, Austria, October 2006. http://snurl.com/wiprFR.
  • 5
    • 38149027548 scopus 로고    scopus 로고
    • When stream cipher analysis meets public-key cryptography
    • E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography, 13th International Workshop, SAG 2006, Springer-Verlag GmbH, September
    • M. Finiasz and S. Vaudenay. When stream cipher analysis meets public-key cryptography. In E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography - 13th International Workshop, SAG 2006, LNCS, volume 4356, pages 266-284. Springer-Verlag GmbH, September 2007. http://snurl.com/wiprFV.
    • (2007) LNCS , vol.4356 , pp. 266-284
    • Finiasz, M.1    Vaudenay, S.2
  • 6
    • 34548820491 scopus 로고    scopus 로고
    • F.; Wolkerstorfer. ECC Processor with Low Die Size for RFID Applications
    • 27-30 May 2007
    • J. Furbass, F.; Wolkerstorfer. ECC Processor with Low Die Size for RFID Applications. IEEE International Symposium on Circuits and Systems, 2007, pages 1835-1838, 27-30 May 2007. http://snurl.com/wiprFW.
    • (2007) IEEE International Symposium on Circuits and Systems , pp. 1835-1838
    • Furbass, J.1
  • 9
    • 70349143245 scopus 로고    scopus 로고
    • E. Inc. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz, 960 MHz, version 1.0.9. Online, September 2005
    • E. Inc. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz - 960 MHz, version 1.0.9. Online, September 2005. http://snurl.com/wiprEPC.
  • 10
    • 70349100900 scopus 로고    scopus 로고
    • Digitally watermarking RSA moduli. Cryptology ePrint Archive
    • Report 2001/013
    • A. M. Johnston. Digitally watermarking RSA moduli. Cryptology ePrint Archive, Report 2001/013. http://snurl.com/wiprJ.
    • Johnston, A.M.1
  • 13
    • 0023984964 scopus 로고
    • How to construct pseudorandom permutations from pseudorandom functions
    • M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988. http://snurl.com/wiprLR.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 373-386
    • Luby, M.1    Rackoff, C.2
  • 14
    • 84886218215 scopus 로고    scopus 로고
    • Public key cryptography and RFID tags
    • M. Abe, editor, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2007, Springer-Verlag GmbH, February 2007
    • M. McLoone and M. Robshaw. Public key cryptography and RFID tags. In M. Abe, editor, Topics in Cryptology - The Cryptographers' Track at the RSA Conference 2007, LNCS, volume 4337, pages 372-384. Springer-Verlag GmbH, February 2007. http://snurl.com/wiprHcLR.
    • LNCS , vol.4337 , pp. 372-384
    • McLoone, M.1    Robshaw, M.2
  • 15
    • 35048866823 scopus 로고    scopus 로고
    • Method, sender apparatus and receiver apparatus for modulo operation
    • European patent application no. 91402958.2, Filed 10/27/1992. http://snurl.com/wiprN
    • D. Naccache. Method, sender apparatus and receiver apparatus for modulo operation. European patent application no. 91402958.2, Filed 10/27/1992. http://snurl.com/wiprN.
    • Naccache, D.1
  • 16
    • 70349123126 scopus 로고    scopus 로고
    • K. Nohl and H. Plotz. MIFARE - little security, despite obscurity. Technical report, 24th Chaos Communication Congress, December 2007. http://snurl.com/wiprNP.
    • K. Nohl and H. Plotz. MIFARE - little security, despite obscurity. Technical report, 24th Chaos Communication Congress, December 2007. http://snurl.com/wiprNP.
  • 17
    • 70349148310 scopus 로고    scopus 로고
    • M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, MIT, Cambridge, MA, USA, 1979. http://snurl.com/wiprR.
    • M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, MIT, Cambridge, MA, USA, 1979. http://snurl.com/wiprR.
  • 19
    • 84948964832 scopus 로고    scopus 로고
    • Memory efficient variants of public-key schemes for smart card applications
    • A. D. Santis, editor, Advances in Cryptology, EUROCRYPT '94, Springer-Verlag GmbH, January 1995
    • A. Shamir. Memory efficient variants of public-key schemes for smart card applications. In A. D. Santis, editor, Advances in Cryptology - EUROCRYPT '94, LNCS, volume 950, page 445. Springer-Verlag GmbH, January 1995. http://snurl.com/wiprS.
    • LNCS , vol.950 , pp. 445
    • Shamir, A.1
  • 20
    • 50249161524 scopus 로고    scopus 로고
    • SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags
    • A. Biryukov, editor, Springer-Verlag GmbH, To Appear
    • A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In A. Biryukov, editor, Fast Software Encryption, 15th International Workshop, FSE 2008, Lecture Notes in Computer Science. Springer-Verlag GmbH, To Appear.
    • Fast Software Encryption, 15th International Workshop, FSE 2008, Lecture Notes in Computer Science
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.