메뉴 건너뛰기




Volumn , Issue , 2010, Pages 2644-2649

Forward-link authentication for RFIDs

Author keywords

[No Author keywords available]

Indexed keywords

ASYMMETRIC DESIGN; BINARY OPERATIONS; COMPUTATIONAL OPERATIONS; EFFICIENT AUTHENTICATION; ERROR CORRECTING CODE; FORWARD-LINK; PUBLIC KEY INFRASTRUCTURE; RF-ID TAGS; SYNDROME DECODING; ZERO KNOWLEDGE;

EID: 78751625225     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2010.5671786     Document Type: Conference Paper
Times cited : (2)

References (25)
  • 2
    • 70350633827 scopus 로고    scopus 로고
    • Reducing Key Length of the McEliece Cryptosystem
    • Advances in Cryptology (AFRICACRYPT'09), Springer-Verlag
    • Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani. Reducing Key Length of the McEliece Cryptosystem. In Advances in Cryptology (AFRICACRYPT'09), volume 5580 of LNCS, pages 77-97. Springer-Verlag, 2009.
    • (2009) LNCS , vol.5580 , pp. 77-97
    • Berger, T.P.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 4
    • 56749156338 scopus 로고    scopus 로고
    • McEliece cryptosystem implementation: Theory and practice
    • Second International Workshop in Post-Quantum Cryptography: PQCrypto'08
    • Bhaskar Biswas and Nicolas Sendrier. McEliece cryptosystem implementation: theory and practice. In Second International Workshop in Post-Quantum Cryptography: PQCrypto'08, volume 5299 of LNCS, pages 47-62, 2008.
    • (2008) LNCS , vol.5299 , pp. 47-62
    • Biswas, B.1    Sendrier, N.2
  • 5
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), IACR, Springer-Verlag
    • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), volume 3156 of Lecture Notes in Computer Science, pages 357-370. IACR, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 7
    • 44449155290 scopus 로고    scopus 로고
    • HB#: Increasing the security and efficiency of HB+
    • Advances in Cryptology (Eurocrypt'08), Springer
    • Henri Gilbert, Matthew J.B. Robshaw, and Yannick Seurin. HB#: increasing the security and efficiency of HB+. In Advances in Cryptology (Eurocrypt'08), volume 4965 of LNCS, pages 361-378. Springer, 2008.
    • (2008) LNCS , vol.4965 , pp. 361-378
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 8
    • 27644472569 scopus 로고    scopus 로고
    • An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol
    • Henri Gilbert, Matthew J.B. Robshaw, and Herv Sibert. An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronics Letters, 41(21):1169-1170, 2005.
    • (2005) IEE Electronics Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.J.B.2    Sibert, H.3
  • 9
    • 33749561582 scopus 로고    scopus 로고
    • On the fly authentication and signature schemes based on groups of unknown order
    • M. Girault, G. Poupard, and J. Stern. On the fly authentication and signature schemes based on groups of unknown order. Journal of Cryptology, 19:463-487, 2006.
    • (2006) Journal of Cryptology , vol.19 , pp. 463-487
    • Girault, M.1    Poupard, G.2    Stern, J.3
  • 12
    • 30344469114 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Advances in Cryptology (Crypto'05), Springer
    • Ari Juels and Stephen A. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology (Crypto'05), volume 3126 of LNCS, pages 198-293. Springer, 2005.
    • (2005) LNCS , vol.3126 , pp. 198-293
    • Juels, A.1    Weis, S.A.2
  • 15
    • 34548162681 scopus 로고    scopus 로고
    • Vulnerability analysis of EMAP - An efficient RFID mutual authentication protocol
    • T. Li and R. Deng. Vulnerability analysis of EMAP - an efficient RFID mutual authentication protocol. In AReS'07, 2007.
    • (2007) AReS'07
    • Li, T.1    Deng, R.2
  • 16
    • 36248977046 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • T. Li and G. Wang. Security analysis of two ultra-lightweight RFID authentication protocols. In IFIP-SEC'07, 2007.
    • (2007) IFIP-SEC'07
    • Li, T.1    Wang, G.2
  • 18
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • ACM, ACM Press
    • David Molnar and David Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Conference on Computer and Communications Security (CCS'04), pages 210-219. ACM, ACM Press, 2004.
    • (2004) Conference on Computer and Communications Security (CCS'04) , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 19
  • 20
    • 0001859260 scopus 로고
    • Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
    • Advances in Cryptology (CRYPTO'92), Springer
    • T. Okamoto. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes. In Advances in Cryptology (CRYPTO'92), volume 740 of Lecture Notes in Computer Science, page 3153. Springer, 1992.
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 3153
    • Okamoto, T.1
  • 21
    • 33845455482 scopus 로고    scopus 로고
    • EMAP: An efficient mutual authentication protocol for low-cost RFID tags
    • IS'06, Springer-Verlag
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. EMAP: An efficient mutual authentication protocol for low-cost RFID tags. In IS'06, volume 4277 of LNCS, pages 352-361. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4277 , pp. 352-361
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 23
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • UIC'06, Springer-Verlag
    • P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In UIC'06, volume 4159 of LNCS, pages 912-923. Springer-Verlag, 2006.
    • (2006) LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 24
    • 84955595109 scopus 로고
    • A new identification scheme based on syndrome decoding
    • Jacques Stern. A new identification scheme based on syndrome decoding. In Advances in Cryptology: CRYPTO'93, pages 13-21, 1993.
    • (1993) Advances in Cryptology: CRYPTO'93 , pp. 13-21
    • Stern, J.1
  • 25
    • 0030672385 scopus 로고    scopus 로고
    • Algorithmic complexity in coding theory and the minimum distance problem
    • Alexander Vardy. Algorithmic complexity in coding theory and the minimum distance problem. In twenty-ninth annual ACM symposium on Theory of Computing, volume 92-109, 1997.
    • (1997) Twenty-ninth Annual ACM Symposium on Theory of Computing , vol.92-109
    • Vardy, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.