메뉴 건너뛰기




Volumn 5746 LNCS, Issue , 2009, Pages 38-51

Algebraic attacks on RFID protocols

Author keywords

Algebraic methods; Attacks; Formal verification; RFID; Security protocols

Indexed keywords

ALGEBRAIC METHODS; ATTACKS; FORMAL VERIFICATION; RFID; SECURITY PROTOCOLS; ALGEBRAIC ATTACK; ALGEBRAIC METHOD; ALGEBRAIC PROPERTIES; MODULAR ADDITION; SEVERAL PROTOCOLS; UN TRACEABILITYS;

EID: 70350597641     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03944-7_4     Document Type: Conference Paper
Times cited : (31)

References (33)
  • 2
    • 84994742813 scopus 로고    scopus 로고
    • Lowe, G.: A hierarchy of authentication specifications. In: CSFW, pp. 31-44 (1997)
    • Lowe, G.: A hierarchy of authentication specifications. In: CSFW, pp. 31-44 (1997)
  • 3
    • 44649113207 scopus 로고    scopus 로고
    • Untraceability of RFID Protocols
    • Onieva, J.A, Sauveron, D, Chaumette, S, Gollmann, D, Markantonakis, K, eds, WISTP 2008, Springer, Heidelberg
    • van Deursen, T., Mauw, S., Radomirović, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol. 5019, pp. 1-15. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5019 , pp. 1-15
    • van Deursen, T.1    Mauw, S.2    Radomirović, S.3
  • 4
    • 33744939250 scopus 로고    scopus 로고
    • Adversary model for radio frequency identification
    • Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL, Security and Cryptography Laboratory (LASEC, Lausanne, Switzerland September
    • Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
    • (2005)
    • Avoine, G.1
  • 6
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Vaudenay, S.: On privacy models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1
  • 7
    • 43149103199 scopus 로고    scopus 로고
    • Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, 4964, pp. 318-332. Springer, Heidelberg (2008)
    • Damgård, I., Pedersen, M.Ø.: RFID security: Tradeoffs between security and efficiency. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 318-332. Springer, Heidelberg (2008)
  • 9
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Elsevier Science Publishers
    • Chien, H.Y., Chen, C.H.: Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standars & Interfaces, Elsevier Science Publishers 29(2), 254-259 (2007)
    • (2007) Computer Standars & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 12
    • 58449108568 scopus 로고    scopus 로고
    • Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, 5339, pp. 149-161. Springer, Heidelberg (2008)
    • Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID identification protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
  • 13
    • 38149091047 scopus 로고    scopus 로고
    • Chien, H.Y., Huang, C.W.: A lightweight RFID protocol using substring. In: Kuo, T.-W., Sha, E., Guo, M., Yang, L.T., Shao, Z. (eds.) EUC 2007. LNCS, 4808, pp. 422-431. Springer, Heidelberg (2007)
    • Chien, H.Y., Huang, C.W.: A lightweight RFID protocol using substring. In: Kuo, T.-W., Sha, E., Guo, M., Yang, L.T., Shao, Z. (eds.) EUC 2007. LNCS, vol. 4808, pp. 422-431. Springer, Heidelberg (2007)
  • 14
    • 33845415153 scopus 로고    scopus 로고
    • Kim, K.H., Choi, E.Y., Lee, S.M., Lee, D.H.: Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 362-371. Springer, Heidelberg (2006)
    • Kim, K.H., Choi, E.Y., Lee, S.M., Lee, D.H.: Secure EPCglobal class-1 gen-2 RFID system against security and privacy problems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 362-371. Springer, Heidelberg (2006)
  • 15
    • 34247218520 scopus 로고    scopus 로고
    • RFID mutual authentication scheme based on synchronized secret information
    • Hiroshima, Japan January
    • Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on Cryptography and Information Security, Hiroshima, Japan (January 2006)
    • (2006) Symposium on Cryptography and Information Security
    • Lee, S.1    Asano, T.2    Kim, K.3
  • 17
    • 84869649421 scopus 로고    scopus 로고
    • van Deursen, T, Radomirović, S, Attacks on RFID protocols (version 1.0, Cryptology ePrint Archive, Report 2008/310 July 2008
    • van Deursen, T., Radomirović, S.: Attacks on RFID protocols (version 1.0). Cryptology ePrint Archive, Report 2008/310 (July 2008), http://eprint.iacr.org/2008/310
  • 18
    • 24944514681 scopus 로고    scopus 로고
    • Operational Semantics of Security Protocols
    • Leue, S, Systä, T.J, eds, Scenarios: Models, Transformations and Tools, Springer, Heidelberg
    • Cremers, C., Mauw, S.: Operational Semantics of Security Protocols. In: Leue, S., Systä, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol. 3466, pp. 66-89. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3466 , pp. 66-89
    • Cremers, C.1    Mauw, S.2
  • 20
    • 70350607144 scopus 로고    scopus 로고
    • Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
    • Kim, I.J., Choi, E.Y., Lee, D.H.: Secure mobile RFID system against privacy and security problems. In: SecPerU 2007 (2007)
  • 21
    • 34748921704 scopus 로고    scopus 로고
    • Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234-241 (2007)
    • Li, Y., Ding, X.: Protecting RFID communications in supply chains. In: ASIACCS, pp. 234-241 (2007)
  • 22
    • 38349066494 scopus 로고    scopus 로고
    • Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS, 4456, pp. 778-787. Springer, Heidelberg (2007)
    • Osaka, K., Takagi, T., Yamazaki, K., Takahashi, O.: An efficient and secure RFID security method with ownership transfer. In: Wang, Y., Cheung, Y.-m., Liu, H. (eds.) CIS 2006. LNCS, vol. 4456, pp. 778-787. Springer, Heidelberg (2007)
  • 23
    • 70350592734 scopus 로고    scopus 로고
    • Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (July 2005)
    • Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (July 2005)
  • 24
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Juels, A., Weis, S.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 26
    • 38049010942 scopus 로고    scopus 로고
    • Information confinement, privacy, and security in RFID systems
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Di Pietro, R., Molva, R.: Information confinement, privacy, and security in RFID systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 187-202. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 187-202
    • Di Pietro, R.1    Molva, R.2
  • 27
    • 33750067948 scopus 로고    scopus 로고
    • 2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, 4159, pp. 912-923. Springer, Heidelberg (2006)
    • 2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
  • 28
    • 33845455482 scopus 로고    scopus 로고
    • Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, 4277, pp. 352-361. Springer, Heidelberg (2006)
    • Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol. 4277, pp. 352-361. Springer, Heidelberg (2006)
  • 30
    • 38149037913 scopus 로고    scopus 로고
    • Passive attacks on a class of authentication protocols for RFID
    • Nam, K.-H, Rhee, G, eds, ICISC 2007, Springer, Heidelberg
    • Alomair, B., Lazos, L., Poovendran, R.: Passive attacks on a class of authentication protocols for RFID. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 102-115. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 102-115
    • Alomair, B.1    Lazos, L.2    Poovendran, R.3
  • 33
    • 33745757995 scopus 로고    scopus 로고
    • Kang, J., Nyang, D.: RFID authentication protocol with strong resistance against traceability and denial of service attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, 3813, pp. 164-175. Springer, Heidelberg (2005)
    • Kang, J., Nyang, D.: RFID authentication protocol with strong resistance against traceability and denial of service attacks. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 164-175. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.