-
1
-
-
77953909886
-
Bridge Researchers Demo Highly Secure EPC Gen-2 RFID
-
July
-
M. C. 0'Connor. Bridge Researchers Demo Highly Secure EPC Gen-2 RFID. RFID Journal, July 2009.
-
(2009)
RFID Journal
-
-
O'Connor, M.C.1
-
2
-
-
77953895834
-
-
Cryptology EPrint Archive, Report 2009/543
-
G. Avoine, M. Ali Bingol, S. Kardas, C. Lauradoux, and B. Martin. A formal framework for cryptanalyzing rfid distance bounding protocols. Cryptology ePrint Archive, Report 2009/543, 2009. http://eprint.iacr.org/.
-
(2009)
A Formal Framework for Cryptanalyzing Rfid Distance Bounding Protocols
-
-
Avoine, G.1
Ali Bingol, M.2
Kardas, S.3
Lauradoux, C.4
Martin, B.5
-
3
-
-
54249156664
-
EPassport: Securing International Contacts with Contactless Chips
-
Financial Cryptography and Data Security - FC'08, Springer-Verlag, January
-
G. Avoine, K. Kalach, and J.-J. Quisquater. ePassport: Securing International Contacts with Contactless Chips. In Financial Cryptography and Data Security - FC'08, volume 5143 of Lecture Notes in Computer Science, pages 141-155. Springer-Verlag, January 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5143
, pp. 141-155
-
-
Avoine, G.1
Kalach, K.2
Quisquater, J.-J.3
-
4
-
-
77953896201
-
An efficient distance bounding RFID authentication protocol: Balancing false-acceptance rate and memory requirement
-
G. Avoine and A. Tchamkerten. An efficient distance bounding RFID authentication protocol: balancing false-acceptance rate and memory requirement. In Information Security Conference - ISC'09, September 2009.
-
Information Security Conference - ISC'09, September 2009
-
-
Avoine, G.1
Tchamkerten, A.2
-
5
-
-
51049092732
-
Mind the Gap
-
Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems, Springer
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. J.B. Robshaw, and Y. Seurin. Hash Functions and RFID Tags : Mind The Gap. In Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems, volume 5154 of Lecture Notes in Computer Science. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5154
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin Hash Functions, Y.6
Tags, R.7
-
8
-
-
33751546328
-
Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 standards
-
February
-
H.-Y. Chien and C.-H. Chen. Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces, Elsevier Science Publishers, 29(2):254-259, February 2007.
-
(2007)
Computer Standards & Interfaces, Elsevier Science Publishers
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
9
-
-
33744940544
-
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment
-
International Workshop on Security in Ubiquitous Computing Systems - SecUbiq 2005 Springer-Verlag, December
-
E. Y. Choi, S. M. Lee, and D. H. Lee. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In International Workshop on Security in Ubiquitous Computing Systems - SecUbiq 2005, volume 3823 of Lecture Notes in Computer Science, pages 945-954. Springer-Verlag, December 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.M.2
Lee, D.H.3
-
10
-
-
34547672707
-
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy
-
IEEE Computer Society Press, March
-
M. Conti, R. D. Pietro, L. V. Mancini, and A. Spognardi. RIPP-FS: an RFID Identification, Privacy Preserving Protocol with Forward Secrecy. In International Workshop on Pervasive Computing and Communication Security - PerSec 2007, pages 229-234. IEEE Computer Society Press, March 2007.
-
(2007)
International Workshop on Pervasive Computing and Communication Security - PerSec 2007
, pp. 229-234
-
-
Conti, M.1
Pietro, R.D.2
Mancini, L.V.3
Spognardi, A.4
-
16
-
-
33746739905
-
AES Implementation on a Grain of Sand
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a Grain of Sand. IEE Proceedings - Information Security, 152(1):13-20, 2005.
-
(2005)
IEE Proceedings - Information Security
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
22
-
-
2942625823
-
Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
-
IEEE, IEEE Computer Society, March
-
D. Henrici and P. Müller. Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. In International Workshop on Pervasive Computing and Communication Security - PerSec 2004, pages 149-153. IEEE, IEEE Computer Society, March 2004.
-
(2004)
International Workshop on Pervasive Computing and Communication Security - PerSec 2004
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
26
-
-
70349940333
-
The Swiss-Knife RFID Distance Bounding Protocol
-
Proceedings of International Conference on Information Security and Cryptology - ICISC, Springer-Verlag
-
C H. Kim, G. Avoine, F. Koeune, F.-X. Standaert, and O. Pereira. The Swiss-Knife RFID Distance Bounding Protocol. In Proceedings of International Conference on Information Security and Cryptology - ICISC, LNCS. Springer-Verlag, 2008.
-
(2008)
LNCS
-
-
Kim, C.H.1
Avoine, G.2
Koeune, F.3
Standaert, F.-X.4
Pereira, O.5
-
27
-
-
33646815676
-
Some attacks against a double length hash proposal
-
ASIACRYPT, Springer-Verlag
-
L Knudsen and F. Muller. Some attacks against a double length hash proposal. In ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 462-473. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3788
, pp. 462-473
-
-
Knudsen, L.1
Muller, F.2
-
30
-
-
33745597876
-
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
-
Selected Areas in Cryptography - SAC 2005, Springer-Verlag, August
-
D. Molnar, A. Soppera, and D. Wagner. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. In Selected Areas in Cryptography - SAC 2005, volume 3897 of Lecture Notes in Computer Science, pages 276-290. Springer-Verlag, August 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
33
-
-
54349101762
-
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Computer Standards & Interfaces, 31(1):88-97, 2009.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 88-97
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
34
-
-
77953906142
-
-
arXiv.org, Computer Science, Cryptography and Security
-
P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and J. C. A. van der Lubbe. Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks. arXiv.org, Computer Science, Cryptography and Security, 2009.
-
(2009)
Shedding Some Light on RFID Distance Bounding Protocols and Terrorist Attacks
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Van Der Lubbe, J.C.A.4
-
40
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
International Conference on Security in Pervasive Computing - SPC 2003 Springer-Verlag, March
-
S. Weis, S. Sarma, R. Rivest, and D. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In International Conference on Security in Pervasive Computing - SPC 2003, volume 2802 of Lecture Notes in Computer Science, pages 454-469. Springer-Verlag, March 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
41
-
-
33749379761
-
Mutual Authentication Protocol for Low-Cost RFID
-
J. Yang, J. Park, H. Lee, K. Ren, and K. Kim. Mutual Authentication Protocol for Low-Cost RFID. Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005.
-
Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, July 2005
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|