메뉴 건너뛰기




Volumn , Issue , 2011, Pages 532-536

A novel stream cipher with hash function for the RFID device

Author keywords

FPGA; Hash Function; RFID; Stream Cipher

Indexed keywords

COMMUNICATION APPLICATION; DEVICE CIRCUITS; ENCRYPTION FUNCTION; FUNCTION CIRCUIT; HARDWARE CIRCUITS; HARDWARE MODELS; INTEGRITY CHECK; REDUCING POWER; SECURE DATA; STREAM CIPHERS;

EID: 80052354575     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IMIS.2011.83     Document Type: Conference Paper
Times cited : (3)

References (20)
  • 1
    • 24644498485 scopus 로고    scopus 로고
    • RFID: A Technical Overview and Its Applications to the Enterprises
    • Published by the IEEE Computer Society, June
    • R. Weinstein, "RFID: A Technical Overview and Its Applications to the Enterprises," IT Professional., Published by the IEEE Computer Society, vol. 7, Issue 3, pp. 27-33, June, 2005.
    • (2005) IT Professional , vol.7 , Issue.3 , pp. 27-33
    • Weinstein, R.1
  • 2
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • DOI 10.1109/MSP.2005.78
    • S. L. Garfinkel, A. Juels, and R. Pappu, "RFID privacy: an overview of problems and proposed solutions," Security & Privacy, Published by the IEEE Computer Society, vol. 3, Issue 3, pp, 34-43, June, 2005. (Pubitemid 40860471)
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Garfinkel, S.L.1    Juels, A.2    Pappu, R.3
  • 4
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • Feb.
    • A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, Feb. 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 5
    • 33144458681 scopus 로고    scopus 로고
    • Would Macy's scan Gimbels? competitive intelligence and RFID
    • S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison-Wesley
    • R. Stapleton-Gray, "Would Macy's scan Gimbels? competitive intelligence and RFID," in RFID: Applications, Security, and Privacy, S. Garfinkel and B. Rosenberg, Eds. Reading, MA: Addison-Wesley, , pp. 283-290, 2005.
    • (2005) RFID: Applications, Security, and Privacy , pp. 283-290
    • Stapleton-Gray, R.1
  • 6
    • 84935078039 scopus 로고    scopus 로고
    • Security weaknesses in Bluetooth
    • The Cryptographer's Track at RSA, D. Naccache, Ed. New York, Springer-Verlag
    • M. Jakobsson and S. Wetzel, "Security weaknesses in Bluetooth," in The Cryptographer's Track at RSA, D. Naccache, Ed. New York, Springer-Verlag, vol. 2020, Lecture Notes in Computer Science, pp. 176-191, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2020 , pp. 176-191
    • Jakobsson, M.1    Wetzel, S.2
  • 7
    • 26444478592 scopus 로고    scopus 로고
    • RFID Traceability: A Multilayer Problem
    • Financial Cryptography - FC'05, Springer
    • G. Avoine and P. Oechslin, "RFID Traceability: A Multilayer Problem," Financial Cryptography - FC'05, LNCS, Springer, 2005.
    • (2005) LNCS
    • Avoine, G.1    Oechslin, P.2
  • 8
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
    • Proceedings of the 1st Security in Pervasive Computing
    • S. Weis, S. Sarma, R. Rivest, and D. Engels. "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems," Proceedings of the 1st Security in Pervasive Computing, LNCS, vol. 2802, pp. 201-212, 2004.
    • (2004) LNCS , vol.2802 , pp. 201-212
    • Weis, S.1    Sarma, S.2    Rivest, R.3    Engels, D.4
  • 9
    • 33144487342 scopus 로고    scopus 로고
    • An Active Attack Against HB+ - A Provably Secure Lightweight Protocol
    • Report 2005/237
    • H. Gilbert, M. Robshaw, and H. Sibert. "An Active Attack Against HB+ - A Provably Secure Lightweight Protocol." Cryptology ePrint Archive, Report 2005/237, 2005. http://eprint.iacr.org.
    • (2005) Cryptology ePrint Archive
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 10
    • 0038307567 scopus 로고    scopus 로고
    • Mobility Management in Integrated UMTS/WLAN Networks
    • May
    • Vijay K. Varma, et al., "Mobility Management in Integrated UMTS/WLAN Networks," Proceedings of IEEE ICC 2003, vol. 2, pp.1048-1053, May, 2003.
    • (2003) Proceedings of IEEE ICC 2003 , vol.2 , pp. 1048-1053
    • Varma, V.K.1
  • 13
    • 45749088988 scopus 로고    scopus 로고
    • The Security of EPC Gen2 Compliant RFID Protocols
    • ACNS, S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, Eds. Springer
    • M. Burmester, and B. de Medeiros, "The Security of EPC Gen2 Compliant RFID Protocols," In ACNS, S. M. Bellovin, R. Gennaro, A. D. Keromytis, and M. Yung, Eds. Lecture Notes in Computer Science, Springer, vol. 5037, pp 490-506, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5037 , pp. 490-506
    • Burmester, M.1    De Medeiros, B.2
  • 14
    • 70349952297 scopus 로고    scopus 로고
    • Secure EPC Gen2 Compliant Radio Frequency Identification
    • ADHOCNOW, P. M. Ruiz and J. J. Garcia-Luna-Aceves, Eds. Springer
    • M. Burmester, B. de Medeiros, J. Munilla, and A. Peinado, " Secure EPC Gen2 Compliant Radio Frequency Identification," In ADHOCNOW, P. M. Ruiz and J. J. Garcia-Luna-Aceves, Eds. Lecture Notes in Computer Science, vol. 5793. Springer, pp. 227-240, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5793 , pp. 227-240
    • Burmester, M.1    De Medeiros, B.2    Munilla, J.3    Peinado, A.4
  • 16
    • 84947914704 scopus 로고    scopus 로고
    • Fast Hashing and Stream Encryption with PANAMA
    • Fast Software Encryption
    • Joan Daemen and Craig Clapp, "Fast Hashing and Stream Encryption with PANAMA," Fast Software Encryption, Lecture Notes in Computer Science, vol. 1372, pp.60-74, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1372 , pp. 60-74
    • Daemen, J.1    Clapp, C.2
  • 17
    • 84871733065 scopus 로고    scopus 로고
    • eSTREAM Phase 3 Candidates.
    • eSTREAM Phase 3 Candidates. eSTREAM, ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/phase3list.html.
    • eSTREAM, ECRYPT Stream Cipher Project
  • 18
    • 84860313632 scopus 로고    scopus 로고
    • Comparison of hardware performance of selected phase II eSTREAM candidates
    • eSTREAM, ECRYPT Stream Cipher Project, Report 2007/026
    • Gaj, K., Southern, G., Bachimanchi, R., "Comparison of hardware performance of selected phase II eSTREAM candidates", State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report 2007/026 (2007). http://www.ecrypt.eu.org/stream.
    • (2007) State of the Art of Stream Ciphers Workshop (SASC 2007)
    • Gaj, K.1    Southern, G.2    Bachimanchi, R.3
  • 20
    • 57049142715 scopus 로고    scopus 로고
    • Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles
    • De Canniere C., Preneel B. " Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles", eSTREAM, ECRYPT Stream Cipher Project Report 2006/021 (2006). http://www.ecrypt.eu.org/stream/phase3list.html.
    • (2006) eSTREAM, ECRYPT Stream Cipher Project Report 2006/021
    • De Canniere, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.