-
2
-
-
38049010942
-
Information confinement, privacy, and security in RFID systems
-
Springer
-
R. di Pietro and R. Molva, "Information Confinement, Privacy, and Security in RFID Systems, " Lecture Notes in Computer Science, pp. 187-202, Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 187-202
-
-
Di Pietro, R.1
Molva, R.2
-
3
-
-
34547312233
-
Low power implementation of SHA-1 algorithm for RFID system
-
Y. Choi, M. Kim, T. Kim, and H. Kim, "Low Power Implementation of SHA-1 Algorithm for RFID System, " Proc. 10th Int'l Symp. Consumer Electronics, pp. 1-5, 2006.
-
(2006)
Proc. 10th Int'l Symp. Consumer Electronics
, pp. 1-5
-
-
Choi, Y.1
Kim, M.2
Kim, T.3
Kim, H.4
-
4
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
M. Feldhofer and C. Rechberger, "A Case Against Currently Used Hash Functions in RFID Protocols, " Proc. OTM Conf., pp. 372-381, 2006. (Pubitemid 44891826)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
5
-
-
34548814766
-
Strong crypto for RFID tags - A comparison of low-power hardware implementations
-
4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
-
M. Feldhofer and J. Wolkerstorfer, "Strong Crypto for Rfid Tags-A Comparison of Low-Power Hardware Implementations, " Proc. Int'l Symp. Circuits and Systems, pp. 1839-1842, 2007. (Pubitemid 47448889)
-
(2007)
Proceedings - IEEE International Symposium on Circuits and Systems
, pp. 1839-1842
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
-
6
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
A. Juels and S. Weis, "Authenticating Pervasive Devices with Human Protocols, " Proc. 25th Ann. Int'l Cryptology Conf., pp. 293-308, 2005.
-
(2005)
Proc. 25th Ann. Int'l Cryptology Conf.
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
7
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
A. Juels and S. Weis, "Defining Strong Privacy for RFID, " Proc. IEEE Pervasive Computing Comm. Workshops, pp. 342-347, 2007. (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
8
-
-
79952922929
-
Analysing the molva and di pietro private rfid authentication scheme
-
M. Soos, "Analysing the Molva and di Pietro Private Rfid Authentication Scheme, " RFIDSec, http://events.iaik.tugraz.at/RFIDSec08/, 2008.
-
(2008)
RFIDSec
-
-
Soos, M.1
-
9
-
-
44649113207
-
Untraceability of RFID protocols
-
DOI 10.1007/978-3-540-79966-5-1, Information Security Theory and Practices: Smart Devices, Convergence and Next Generation Networks - Second IFIP WG 11.2 International Workshop, WISTP 2008, Proceedings
-
T. van Deursen, S. Mauw, and S. Radomirovic, "Untraceability of Rfid Protocols, " Proc. Second Workshop Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, pp. 1-15, 2008. (Pubitemid 351775575)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.5019
, pp. 1-15
-
-
Van Deursen, T.1
Mauw, S.2
Radomirovic, S.3
-
10
-
-
33749998666
-
An improved LPN algorithm
-
Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings
-
E. Levieil, P.-A. Fouque, "An Improved LPN Algorithm, " Proc. Conf. Security and Cryptography Networks, pp. 348-359, 2006. (Pubitemid 44568310)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4116
, pp. 348-359
-
-
Levieil, E.1
Fouque, P.-A.2
-
11
-
-
79952916611
-
Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over gf (2) via sat-solvers
-
G. Bard, N. Courtois, and C. Jefferson, "Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials Over gf (2) via Sat-Solvers, " Proc. European Network Excellence Cryptology Workshop, http://eprint.iacr.org/2007/024/, 2007.
-
(2007)
Proc. European Network Excellence Cryptology Workshop
-
-
Bard, G.1
Courtois, N.2
Jefferson, C.3
-
13
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems" Proc. Security in Pervasive Computing Conf., pp. 201-212, 2003.
-
(2003)
Proc. Security in Pervasive Computing Conf.
, pp. 201-212
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
-
14
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Molnar, D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures" Proc. Conf. Computer and Comm. Security, pp. 210-219, 2004. (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
20
-
-
70349083611
-
Rfid security: Tradeoffs between security and efficiency
-
I. Damgård, M. Østergaard, "Rfid Security: Tradeoffs Between Security and Efficiency, " Proc. RSA Conf., http://eprint.iacr.org/ 2006/234.pdf, pp. 318-332, 2006.
-
(2006)
Proc. RSA Conf.
, pp. 318-332
-
-
Damgård, I.1
Østergaard, M.2
-
21
-
-
34547672304
-
Energy, performance, area versus security trade-offs for stream ciphers
-
L. Batina, J. Lano, N. Mentens, B. Preneel, I. Verbauwhede, S. Oers, "Energy, Performance, Area Versus Security Trade-Offs for Stream Ciphers, " Proc. European Network of Excellence in Cryptogoy (ECRYPT) Workshop, The State of the Art of Stream Ciphers (SASC), pp. 302-310, 2004.
-
(2004)
Proc. European Network of Excellence in Cryptogoy (ECRYPT) Workshop, the State of the Art of Stream Ciphers (SASC)
, pp. 302-310
-
-
Batina, L.1
Lano, J.2
Mentens, N.3
Preneel, B.4
Verbauwhede, I.5
Oers, S.6
-
23
-
-
38149068190
-
Algebraic cryptanalysis of the data encryption standard
-
Springer
-
N. Courtois and G. Bard, "Algebraic Cryptanalysis of the Data Encryption Standard, " Lecture Notes in Computer Science, Cryptography and Coding, pp. 152-169, Springer, 2007.
-
(2007)
Lecture Notes in Computer Science, Cryptography and Coding
, pp. 152-169
-
-
Courtois, N.1
Bard, G.2
-
24
-
-
0034387168
-
On the rank of random matrices
-
C. Cooper, "On the Rank of Random Matrices, " Random Structures and Algorithms, vol. 16, no. 2, pp. 209-232, 2000.
-
(2000)
Random Structures and Algorithms
, vol.16
, Issue.2
, pp. 209-232
-
-
Cooper, C.1
-
25
-
-
27644472569
-
+: A provably secure lightweight authentication protocol
-
DOI 10.1049/el:20052622
-
H. Gilbert, M. Robshaw, and H. Sibert, "Active Attack Against Hb+: A Provably Secure Lightweight Authentication Protocol, " IEEE Electronic Letters, vol. 41, no. 21, pp. 1169-1170, Oct. 2005. (Pubitemid 41560540)
-
(2005)
Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
30
-
-
33749578685
-
Applications of SAT solvers to cryptanalysis of hash functions
-
Theory and Applications of Satisfiability Testing, SAT 2006 - 9th International Conference, Proceedings
-
I. Mironov, L. Zhang, "Applications of Sat Solvers to Cryptanalysis of Hash Functions, " Proc. Int'l Conf. Theory and Applications of Satisfiability Testing (SAT '06), pp. 102-115, 2006. (Pubitemid 44531749)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4121
, pp. 102-115
-
-
Mironov, I.1
Zhang, L.2
-
32
-
-
44649115970
-
Attacking Bivium using SAT solvers
-
DOI 10.1007/978-3-540-79719-7-7, Theory and Applications of Satisfiability Testing - SAT 2008 - 11th International Conference, SAT 2008, Proceedings
-
T. Eibach, E. Pilz, and G. Voelkel, "Attacking Bivium Using Sat Solvers." Proc. Int'l Conf. Theory and Applications of Satisfiability Testing (SAT '08), pp. 63-76, 2008. (Pubitemid 351775500)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4996
, pp. 63-76
-
-
Eibach, T.1
Pilz, E.2
Volkel, G.3
|