-
1
-
-
33750018373
-
Shoehorning security into the EPC tag standard
-
R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, Springer-Verlag GmbH, September
-
D. V. Bailey and A. Juels. Shoehorning security into the EPC tag standard. In R. D. Prisco and M. Yung, editors, Security and Cryptography for Networks, 5th International Conference, SCN 2006, LNCS, volume 4116, pages 303-320. Springer-Verlag GmbH, September 2006. http://snurl.com/wiprBJ.
-
(2006)
LNCS
, vol.4116
, pp. 303-320
-
-
Bailey, D.V.1
Juels, A.2
-
2
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, Springer-Verlag GmbH
-
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. In P. Paillier and I. Verbauwhede, editors, Cryptographic Hardware and Embedded Systems-CHES 2007: 9th International Workshop, LNCS, volume 4727, pages 450-466. Springer-Verlag GmbH, 2007. http://snurl.com/wiprBKLPPRSV.
-
(2007)
LNCS
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
3
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop, Springer-Verlag GmbH, July 2004
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In J.-J. Q. Marc Joye, editor, Cryptographic Hardware and Embedded Systems-CHES 2004: 6th International Workshop, LNCS, volume 3156, pages 357-370. Springer-Verlag GmbH, July 2004. http://snurl.com/wiprDFW.
-
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
4
-
-
33845429016
-
-
M. Feldhofer and C. Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In First International OTM Workshop on Information Security (IS'06), Montpellier, France, Oct 30 - Nov 1, 2006. Proceedings, Part I, LNCS, 4277, pages 372-381, Graz, Austria, October 2006. http://snurl.com/wiprFR.
-
M. Feldhofer and C. Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In First International OTM Workshop on Information Security (IS'06), Montpellier, France, Oct 30 - Nov 1, 2006. Proceedings, Part I, LNCS, volume 4277, pages 372-381, Graz, Austria, October 2006. http://snurl.com/wiprFR.
-
-
-
-
5
-
-
38149027548
-
When stream cipher analysis meets public-key cryptography
-
E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography, 13th International Workshop, SAG 2006, Springer-Verlag GmbH, September
-
M. Finiasz and S. Vaudenay. When stream cipher analysis meets public-key cryptography. In E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography - 13th International Workshop, SAG 2006, LNCS, volume 4356, pages 266-284. Springer-Verlag GmbH, September 2007. http://snurl.com/wiprFV.
-
(2007)
LNCS
, vol.4356
, pp. 266-284
-
-
Finiasz, M.1
Vaudenay, S.2
-
6
-
-
34548820491
-
F.; Wolkerstorfer. ECC Processor with Low Die Size for RFID Applications
-
27-30 May 2007
-
J. Furbass, F.; Wolkerstorfer. ECC Processor with Low Die Size for RFID Applications. IEEE International Symposium on Circuits and Systems, 2007, pages 1835-1838, 27-30 May 2007. http://snurl.com/wiprFW.
-
(2007)
IEEE International Symposium on Circuits and Systems
, pp. 1835-1838
-
-
Furbass, J.1
-
7
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
March
-
G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar. State of the art in ultra-low power public key cryptography for wireless sensor networks. In Third IEEE International Conference on Pervasive Computing and Communications Workshops, pages 146-150, March 2005. http://snurl.com/wiprGK0S.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.-P.2
Ozturk, E.3
Sunar, B.4
-
8
-
-
85050160774
-
Probabilistic encryption & how to play mental poker keeping secret all
-
partial information, New York, NY, USA, ACM
-
S. Goldwasser and S. Micali. Probabilistic encryption & how to play mental poker keeping secret all partial information. In STOC '82: Proceedings of the fourteenth annual ACM symposium on Theory of Computing, pages 365-377, New York, NY, USA, 1982. ACM. http://snurl.com/wiprGH.
-
(1982)
STOC '82: Proceedings of the fourteenth annual ACM symposium on Theory of Computing
, pp. 365-377
-
-
Goldwasser, S.1
Micali, S.2
-
9
-
-
70349143245
-
-
E. Inc. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz, 960 MHz, version 1.0.9. Online, September 2005
-
E. Inc. EPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz - 960 MHz, version 1.0.9. Online, September 2005. http://snurl.com/wiprEPC.
-
-
-
-
10
-
-
70349100900
-
Digitally watermarking RSA moduli. Cryptology ePrint Archive
-
Report 2001/013
-
A. M. Johnston. Digitally watermarking RSA moduli. Cryptology ePrint Archive, Report 2001/013. http://snurl.com/wiprJ.
-
-
-
Johnston, A.M.1
-
11
-
-
0024984432
-
The number field sieve
-
New York, NY, USA, ACM
-
A. K. Lenstra, J. H. W. Lenstra, M. S. Manasse, and J. M. Pollard. The number field sieve. In STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of computing, pages 564-572, New York, NY, USA, 1990. ACM. http://snurl.com/wiprLLHP.
-
(1990)
STOC '90: Proceedings of the twenty-second annual ACM symposium on Theory of computing
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra, J.H.W.2
Manasse, M.S.3
Pollard, J.M.4
-
13
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing, 17(2):373-386, 1988. http://snurl.com/wiprLR.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
14
-
-
84886218215
-
Public key cryptography and RFID tags
-
M. Abe, editor, Topics in Cryptology, The Cryptographers' Track at the RSA Conference 2007, Springer-Verlag GmbH, February 2007
-
M. McLoone and M. Robshaw. Public key cryptography and RFID tags. In M. Abe, editor, Topics in Cryptology - The Cryptographers' Track at the RSA Conference 2007, LNCS, volume 4337, pages 372-384. Springer-Verlag GmbH, February 2007. http://snurl.com/wiprHcLR.
-
LNCS
, vol.4337
, pp. 372-384
-
-
McLoone, M.1
Robshaw, M.2
-
15
-
-
35048866823
-
Method, sender apparatus and receiver apparatus for modulo operation
-
European patent application no. 91402958.2, Filed 10/27/1992. http://snurl.com/wiprN
-
D. Naccache. Method, sender apparatus and receiver apparatus for modulo operation. European patent application no. 91402958.2, Filed 10/27/1992. http://snurl.com/wiprN.
-
-
-
Naccache, D.1
-
16
-
-
70349123126
-
-
K. Nohl and H. Plotz. MIFARE - little security, despite obscurity. Technical report, 24th Chaos Communication Congress, December 2007. http://snurl.com/wiprNP.
-
K. Nohl and H. Plotz. MIFARE - little security, despite obscurity. Technical report, 24th Chaos Communication Congress, December 2007. http://snurl.com/wiprNP.
-
-
-
-
17
-
-
70349148310
-
-
M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, MIT, Cambridge, MA, USA, 1979. http://snurl.com/wiprR.
-
M. Rabin. Digitalized signatures and public-key functions as intractable as factorization. Technical report, MIT, Cambridge, MA, USA, 1979. http://snurl.com/wiprR.
-
-
-
-
19
-
-
84948964832
-
Memory efficient variants of public-key schemes for smart card applications
-
A. D. Santis, editor, Advances in Cryptology, EUROCRYPT '94, Springer-Verlag GmbH, January 1995
-
A. Shamir. Memory efficient variants of public-key schemes for smart card applications. In A. D. Santis, editor, Advances in Cryptology - EUROCRYPT '94, LNCS, volume 950, page 445. Springer-Verlag GmbH, January 1995. http://snurl.com/wiprS.
-
LNCS
, vol.950
, pp. 445
-
-
Shamir, A.1
-
20
-
-
50249161524
-
SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags
-
A. Biryukov, editor, Springer-Verlag GmbH, To Appear
-
A. Shamir. SQUASH - a new MAC with provable security properties for highly constrained devices such as RFID tags. In A. Biryukov, editor, Fast Software Encryption, 15th International Workshop, FSE 2008, Lecture Notes in Computer Science. Springer-Verlag GmbH, To Appear.
-
Fast Software Encryption, 15th International Workshop, FSE 2008, Lecture Notes in Computer Science
-
-
Shamir, A.1
|