메뉴 건너뛰기




Volumn , Issue , 2011, Pages 20-25

Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems

Author keywords

Privacy; PUF; RFID; Security

Indexed keywords

AUTHENTICATION PROTOCOLS; CRITICAL POINTS; INFOCOM; LINEAR FEEDBACK SHIFT REGISTERS; MESSAGE INTEGRITY; MUTUAL AUTHENTICATION; NUMBER OF GATES; OBJECT IDENTIFICATION; PRIVACY; PRIVATE INFORMATION; PUF; RF-ID TAGS; RFID; RFID AUTHENTICATION; RFID SYSTEMS; SECURE COMMUNICATIONS; SECURITY; SECURITY AND PRIVACY; TRANSFER PROTOCOL;

EID: 79955894210     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LightSec.2011.10     Document Type: Conference Paper
Times cited : (30)

References (24)
  • 1
    • 33744939250 scopus 로고    scopus 로고
    • Technical report, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC)
    • G. Avoine. Adversary Model for Radio Frequency Identification. Technical report, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), 2005.
    • (2005) Adversary Model for Radio Frequency Identification
    • Avoine, G.1
  • 2
    • 76749106728 scopus 로고    scopus 로고
    • When Compromised Readers Meet RFID
    • H. Youm and M. Yung, editors, Workshop on Information Security Applications - WISA'09, Busan, Korea, August Springer
    • G. Avoine, C. Lauradoux, and T. Martin. When Compromised Readers Meet RFID. In H. Youm and M. Yung, editors, Workshop on Information Security Applications - WISA'09, volume 5932 of Lecture Notes in Computer Science, pages 36-50, Busan, Korea, August 2009. Springer.
    • (2009) Lecture Notes in Computer Science , vol.5932 , pp. 36-50
    • Avoine, G.1    Lauradoux, C.2    Martin, T.3
  • 5
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of epc class 1 generation 2 standards rfid system with mutual authentication and privacy protection
    • C.-L. Chen and Y.-Y. Deng. Conformation of epc class 1 generation 2 standards rfid system with mutual authentication and privacy protection. Eng. Appl. Artif. Intell., 22(8):1284-1291, 2009.
    • (2009) Eng. Appl. Artif. Intell. , vol.22 , Issue.8 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 6
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • H.-Y. Chien and C.-H. Chen. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Comput. Stand. Interfaces, 29(2):254-259, 2007.
    • (2007) Comput. Stand. Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 9
  • 13
    • 84977783611 scopus 로고    scopus 로고
    • Strong and robust RFID authentication enabling perfect ownership transfer
    • Springer-Verlag
    • C. H. Lim and T. Kwon. Strong and robust RFID authentication enabling perfect ownership transfer. In Conference on Information and Communications Security ICICS'06, pages 1-20. Springer-Verlag, 2006.
    • (2006) Conference on Information and Communications Security ICICS'06 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 16
    • 84948963544 scopus 로고
    • The self-shrinking generator
    • W. Meier and O. Staffelbach. The self-shrinking generator. In EUROCRYPT, pages 205-214, 1994.
    • (1994) Eurocrypt , pp. 205-214
    • Meier, W.1    Staffelbach, O.2
  • 21
    • 34547307341 scopus 로고    scopus 로고
    • Physical unclonable functions for device authentication and secret key generation
    • New York, NY, USA, ACM
    • G. E. Suh and S. Devadas. Physical unclonable functions for device authentication and secret key generation. In DAC '07: Proceedings of the 44th annual Design Automation Conference, pages 9-14, New York, NY, USA, 2007. ACM.
    • (2007) DAC '07: Proceedings of the 44th Annual Design Automation Conference , pp. 9-14
    • Suh, G.E.1    Devadas, S.2
  • 22
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting
    • D. Pointcheval, editor, Topics in Cryptology CT-RSA 2006, Springer Berlin / Heidelberg
    • P. Tuyls and L. Batina. RFID-tags for anti-counterfeiting. In D. Pointcheval, editor, Topics in Cryptology CT-RSA 2006, volume 3860 of Lecture Notes in Computer Science, pages 115-131. Springer Berlin / Heidelberg, 2006.
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 23
    • 38149038702 scopus 로고    scopus 로고
    • On privacy models for RFID
    • K. Kurosawa, editor, Advances in Cryptology ASIACRYPT 2007, Springer Berlin / Heidelberg
    • S. Vaudenay. On privacy models for RFID. In K. Kurosawa, editor, Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 68-87. Springer Berlin / Heidelberg, 2008.
    • (2008) Lecture Notes in Computer Science , vol.4833 , pp. 68-87
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.