-
2
-
-
52949116081
-
A Practical Attack on the MIFARE Classic
-
Electronic version
-
Gans, G. K., Hoepman, J., and Garcia, F. D. (2008). A Practical Attack on the MIFARE Classic [Electronic version]. Lecture Notes in Computer Science; 5189, 267-282
-
(2008)
Lecture Notes in Computer Science
, vol.5189
, pp. 267-282
-
-
Gans, G.K.1
Hoepman, J.2
Garcia, F.D.3
-
4
-
-
33144457479
-
RFID Security and Privacy: A Research Survey
-
Electronic version
-
Juels, A. (2006). RFID Security and Privacy: A Research Survey [Electronic version]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 24 (2), 381-394
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
6
-
-
84919793621
-
-
Mifare.net (n.d.). Retrieved March 2011, from
-
Mifare.net (n.d.). The success of MIFARE. Retrieved March 2011, from http://www.mifare.net/
-
The Success of MIFARE
-
-
-
7
-
-
82155202342
-
-
MF0ICU2 retrieved December 2010 from
-
MF0ICU2 (2009). MIFARE Ultralight C MIFARE Ultralight C. retrieved December 2010 from http://www.nxp.com/documents/short data sheet/MF0ICU2 SDS.pdf
-
(2009)
MIFARE Ultralight C MIFARE Ultralight C
-
-
-
9
-
-
33947538532
-
Protocols for RFID tag/reader authentication
-
Piramuthu, S. (2007). Protocols for RFID tag/reader authentication. Decision Support Systems, 43 (3), 897-914
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 897-914
-
-
Piramuthu, S.1
-
10
-
-
0003822632
-
-
Retrieved December 2010 from
-
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J. & Vo, S. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Retrieved December 2010 from, http://csrc.nist.gov/ groups/ST/toolkit/rng/documents/SP800-22b.pdf
-
(2001)
A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
-
12
-
-
3843152778
-
True Random Bit Generation from a Double-Scroll Attractor
-
Electronic version
-
Yalcin, M.E., Suykens, J.A. & Vandewalle, J. (2004). True Random Bit Generation From a Double-Scroll Attractor [Electronic version]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS; 51 (7), 1395-1404
-
(2004)
IEEE Transactions on Circuits and Systems
, vol.51
, Issue.7
, pp. 1395-1404
-
-
Yalcin, M.E.1
Suykens, J.A.2
Vandewalle, J.3
-
13
-
-
77949562527
-
Cryptanalysis of Some RFID Authentication Protocols
-
Tianjie Cao, Peng Shen, Elisa Bertino: Cryptanalysis of Some RFID Authentication Protocols. JCM 3(7): 20-27 (2008)
-
(2008)
JCM
, vol.3
, Issue.7
, pp. 20-27
-
-
Cao, T.1
Shen, P.2
Bertino, E.3
-
15
-
-
57049128814
-
Dismantling the MIFARE Classic
-
13th European Symposium on Research in Computer Security (ESORICS 2008), Springer
-
Garcia, Flavio D.; Gerhard de Koning Gans; Ruben Muijrers; Peter van Rossum, Roel Verdult; Ronny Wichers Schreur; Bart Jacobs. Dismantling the MIFARE Classic. 13th European Symposium on Research in Computer Security (ESORICS 2008), LNCS, Springer.
-
LNCS
-
-
Garcia, F.D.1
De Koning Gans, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Schreur, R.W.6
Jacobs, B.7
|