메뉴 건너뛰기




Volumn 8, Issue 3, 2011, Pages 466-480

The Ff-family of protocols for RFID-privacy and authentication

Author keywords

algebraic attacks; authentication; Lightweight RFID security; LPN; privacy; SAT solving

Indexed keywords

ALGEBRA; AUTHENTICATION; DATA PRIVACY; HASH FUNCTIONS;

EID: 79952969303     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2010.37     Document Type: Article
Times cited : (9)

References (33)
  • 2
    • 38049010942 scopus 로고    scopus 로고
    • Information confinement, privacy, and security in RFID systems
    • Springer
    • R. di Pietro and R. Molva, "Information Confinement, Privacy, and Security in RFID Systems, " Lecture Notes in Computer Science, pp. 187-202, Springer, 2007.
    • (2007) Lecture Notes in Computer Science , pp. 187-202
    • Di Pietro, R.1    Molva, R.2
  • 5
    • 34548814766 scopus 로고    scopus 로고
    • Strong crypto for RFID tags - A comparison of low-power hardware implementations
    • 4253019, 2007 IEEE International Symposium on Circuits and Systems, ISCAS 2007
    • M. Feldhofer and J. Wolkerstorfer, "Strong Crypto for Rfid Tags-A Comparison of Low-Power Hardware Implementations, " Proc. Int'l Symp. Circuits and Systems, pp. 1839-1842, 2007. (Pubitemid 47448889)
    • (2007) Proceedings - IEEE International Symposium on Circuits and Systems , pp. 1839-1842
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 6
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • A. Juels and S. Weis, "Authenticating Pervasive Devices with Human Protocols, " Proc. 25th Ann. Int'l Cryptology Conf., pp. 293-308, 2005.
    • (2005) Proc. 25th Ann. Int'l Cryptology Conf. , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 8
    • 79952922929 scopus 로고    scopus 로고
    • Analysing the molva and di pietro private rfid authentication scheme
    • M. Soos, "Analysing the Molva and di Pietro Private Rfid Authentication Scheme, " RFIDSec, http://events.iaik.tugraz.at/RFIDSec08/, 2008.
    • (2008) RFIDSec
    • Soos, M.1
  • 11
    • 79952916611 scopus 로고    scopus 로고
    • Efficient methods for conversion and solution of sparse systems of low-degree multivariate polynomials over gf (2) via sat-solvers
    • G. Bard, N. Courtois, and C. Jefferson, "Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials Over gf (2) via Sat-Solvers, " Proc. European Network Excellence Cryptology Workshop, http://eprint.iacr.org/2007/024/, 2007.
    • (2007) Proc. European Network Excellence Cryptology Workshop
    • Bard, G.1    Courtois, N.2    Jefferson, C.3
  • 14
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID issues, practices, and architectures
    • Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
    • D. Molnar, D. Wagner, "Privacy and Security in Library RFID: Issues, Practices, and Architectures" Proc. Conf. Computer and Comm. Security, pp. 210-219, 2004. (Pubitemid 40338202)
    • (2004) Proceedings of the ACM Conference on Computer and Communications Security , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 20
    • 70349083611 scopus 로고    scopus 로고
    • Rfid security: Tradeoffs between security and efficiency
    • I. Damgård, M. Østergaard, "Rfid Security: Tradeoffs Between Security and Efficiency, " Proc. RSA Conf., http://eprint.iacr.org/ 2006/234.pdf, pp. 318-332, 2006.
    • (2006) Proc. RSA Conf. , pp. 318-332
    • Damgård, I.1    Østergaard, M.2
  • 24
    • 0034387168 scopus 로고    scopus 로고
    • On the rank of random matrices
    • C. Cooper, "On the Rank of Random Matrices, " Random Structures and Algorithms, vol. 16, no. 2, pp. 209-232, 2000.
    • (2000) Random Structures and Algorithms , vol.16 , Issue.2 , pp. 209-232
    • Cooper, C.1
  • 25
    • 27644472569 scopus 로고    scopus 로고
    • +: A provably secure lightweight authentication protocol
    • DOI 10.1049/el:20052622
    • H. Gilbert, M. Robshaw, and H. Sibert, "Active Attack Against Hb+: A Provably Secure Lightweight Authentication Protocol, " IEEE Electronic Letters, vol. 41, no. 21, pp. 1169-1170, Oct. 2005. (Pubitemid 41560540)
    • (2005) Electronics Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.