-
2
-
-
38149037913
-
Passive attacks on a class of authentication protocols for RFID
-
K.-H. Nam, G. Rhee, Springer Seoul, Korea
-
A. Alomair, L. Lazos, and R. Poovendran Passive attacks on a class of authentication protocols for RFID K.-H. Nam, G. Rhee, International conference on information security and cryptology - ICISC 2007. Lecture notes in computer science vol. 4817 2007 Springer Seoul, Korea 102 115
-
(2007)
International Conference on Information Security and Cryptology - ICISC 2007. Lecture Notes in Computer Science
, vol.4817
, pp. 102-115
-
-
Alomair, A.1
Lazos, L.2
Poovendran, R.3
-
3
-
-
33744939250
-
Adversary model for radio frequency identification
-
Lausanne, Switzerland: Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); September
-
Avoine G. Adversary model for radio frequency identification. Technical report LASEC-REPORT-2005-001. Lausanne, Switzerland: Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC); September 2005.
-
(2005)
Technical Report LASEC-REPORT-2005-001
-
-
Avoine, G.1
-
4
-
-
84981171135
-
-
January
-
Avoine G. January 2011. RFID lounge 〈 http://www.avoine.net/rfid/ 〉.
-
(2011)
RFID Lounge
-
-
Avoine, G.1
-
5
-
-
78650085573
-
Strong authentication and strong integrity (SASI) is not that strong
-
S.B. Ors Yalcin, Springer Istanbul, Turkey
-
G. Avoine, X. Carpent, and B. Martin Strong authentication and strong integrity (SASI) is not that strong S.B. Ors Yalcin, Workshop on RFID security - RFIDSec10. Lecture notes in computer science 6370 2010 Springer Istanbul, Turkey 50 64
-
(2010)
Workshop on RFID Security - RFIDSec10. Lecture Notes in Computer Science
, vol.6370
, pp. 50-64
-
-
Avoine, G.1
Carpent, X.2
Martin, B.3
-
6
-
-
74549144023
-
Breaking LMAP
-
Malaga, Spain; July
-
Bárász, M, Boros, B, Ligeti, P, Lója, K, Nagy, D. Breaking LMAP. In: Conference on RFID security, Malaga, Spain; July 2007.
-
(2007)
Conference on RFID Security
-
-
Bárász, M.1
Boros, B.2
Ligeti, P.3
Lója, K.4
Nagy, D.5
-
7
-
-
58049161510
-
Passive attack against the M2AP mutual authentication protocol for RFID tags
-
Vienna, Austria; September
-
Bárász, M, Boros, B, Ligeti, P, Lója, K, Nagy, D. Passive attack against the M2AP mutual authentication protocol for RFID tags. In: First international EURASIP workshop on RFID technology. Vienna, Austria; September 2007.
-
(2007)
First International EURASIP Workshop on RFID Technology
-
-
Bárász, M.1
Boros, B.2
Ligeti, P.3
Lója, K.4
Nagy, D.5
-
8
-
-
74049109627
-
An efficient forward private RFID protocol
-
E. Al-Shaer, S. Jha, A.D. Keromytis, ACM, ACM Press Chicago, Illinois, USA
-
C. Berbain, O. Billet, J. Etrog, and H. Gilbert An efficient forward private RFID protocol E. Al-Shaer, S. Jha, A.D. Keromytis, Conference on computer and communications security - ACM CCS09 2009 ACM, ACM Press Chicago, Illinois, USA 43 53
-
(2009)
Conference on Computer and Communications Security - ACM CCS09
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
9
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
E. Oswald, P. Rohatgi, Springer Washington, DC, USA
-
A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M. Robshaw, and Y. Seurin Hash functions and RFID tags: mind the gap E. Oswald, P. Rohatgi, Proceedings of the 10th international workshop cryptographic hardware and embedded systems - CHES 2008. Lecture notes in computer science vol. 5154 2008 Springer Washington, DC, USA 283 299
-
(2008)
Proceedings of the 10th International Workshop Cryptographic Hardware and Embedded Systems - CHES 2008. Lecture Notes in Computer Science
, vol.5154
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.5
Seurin, Y.6
-
10
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
DOI 10.1109/SECPERU.2006.10, 1644274, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
-
Bringer J, Chabanne H, Dottax E, Securite SD. HB: a lightweight authentication protocol secure against some attacks. In: Second international workshop on security, privacy and trust in pervasive and ubiquitous computing, SecPerU 2006; 2006. p. 2833. (Pubitemid 46028608)
-
(2006)
Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
, vol.2006
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
11
-
-
77953701050
-
Data synchronization in privacy-preserving RFID authentication schemes
-
Budapest, Hungary; July
-
Canard S, Coisel I. Data synchronization in privacy-preserving RFID authentication schemes. In: Workshop on RFID security - RFIDSec08. Budapest, Hungary; July 2008.
-
(2008)
Workshop on RFID Security - RFIDSec08
-
-
Canard, S.1
Coisel, I.2
-
12
-
-
77956422789
-
Security of privacy-preserving RFID systems
-
Sun Yat-sen University, IEEE Guangzhou, China
-
S. Canard, I. Coisel, and M. Girauld Security of privacy-preserving RFID systems IEEE international conference on RFID-technology and applications - RFID-TA10 2010 Sun Yat-sen University, IEEE Guangzhou, China 269 274
-
(2010)
IEEE International Conference on RFID-technology and Applications - RFID-TA10
, pp. 269-274
-
-
Canard, S.1
Coisel, I.2
Girauld, M.3
-
14
-
-
34547630116
-
Secure anonymous RFID authentication protocols
-
Tallahassee, Florida, USA: Florida State University, Department of Computer Science
-
Chatmon C, van Le T, Burmester M. Secure anonymous RFID authentication protocols. Technical report TR-060112. Tallahassee, Florida, USA: Florida State University, Department of Computer Science; 2006.
-
(2006)
Technical Report TR-060112
-
-
Chatmon, C.1
Van Le, T.2
Burmester, M.3
-
16
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340 (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
17
-
-
33751546328
-
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
-
DOI 10.1016/j.csi.2006.04.004, PII S092054890600064X
-
H.-Y. Chien, and C.-H. Chen Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards Computer Standards & Interfaces 29 2 2007 254 259 (Pubitemid 44829930)
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.2
, pp. 254-259
-
-
Chien, H.-Y.1
Chen, C.-H.2
-
18
-
-
78650135521
-
Security of ultra-lightweight RFID authentication protocols and its improvements
-
H.-Y. Chien, and C.-W. Huang Security of ultra-lightweight RFID authentication protocols and its improvements ACM SIGOPS Operating Systems Review 41 4 2007 86
-
(2007)
ACM SIGOPS Operating Systems Review
, vol.41
, Issue.4
, pp. 86
-
-
Chien, H.-Y.1
Huang, C.-W.2
-
20
-
-
82955160860
-
From weaknesses to secret disclosure in a recent ultra-lightweight RFID authentication protocol
-
DArco P, De Santis A. From weaknesses to secret disclosure in a recent ultra-lightweight RFID authentication protocol. Cryptology ePrint Archive, Report 2008/470, 〈 http://eprint.iacr.org/ 〉; 2008.
-
(2008)
Cryptology EPrint Archive, Report 2008/470
-
-
Darco, P.1
De Santis, A.2
-
23
-
-
27644472569
-
+: A provably secure lightweight authentication protocol
-
DOI 10.1049/el:20052622
-
H. Gilbert, M. Robshaw, and H. Sibert Active attack against HB: a provably secure lightweight authentication protocol Electronics Letters 41 21 2005 1169 1170 (Pubitemid 41560540)
-
(2005)
Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
24
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
-
R. Sandhu, R. Thomas, IEEE Computer Society Orlando, Florida, USA
-
D. Henrici, and P. Müller Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers R. Sandhu, R. Thomas, International workshop on pervasive computing and communication security - PerSec 2004 2004 IEEE Computer Society Orlando, Florida, USA 149 153
-
(2004)
International Workshop on Pervasive Computing and Communication Security - PerSec 2004
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
26
-
-
34547254510
-
Wheedham: An automatically designed block cipher by means of genetic programming
-
Hernandez-Castro JC, Estevez-Tapiador JM, Ribagorda-Garnacho A, Ramos-Alvarez B. Wheedham: an automatically designed block cipher by means of genetic programming. In: IEEE congress on evolutionary computation, CEC 2006. p. 1929; 2006.
-
(2006)
IEEE Congress on Evolutionary Computation, CEC 2006
, pp. 19-29
-
-
Hernandez-Castro, J.C.1
Estevez-Tapiador, J.M.2
Ribagorda-Garnacho, A.3
Ramos-Alvarez, B.4
-
27
-
-
78650086408
-
Cryptanalysis of the DavidPrasad RFID ultralightweight authentication protocol
-
S.B. Ors Yalcin, Springer Istanbul, Turkey
-
J.C. Hernandez-Castro, P. Peris-Lopez, R.C.W. Phan, and J.M. Estevez-Tapiador Cryptanalysis of the DavidPrasad RFID ultralightweight authentication protocol S.B. Ors Yalcin, Workshop on RFID security - RFIDSec10. Lecture notes in computer science vol. 6370 2010 Springer Istanbul, Turkey 23 34
-
(2010)
Workshop on RFID Security - RFIDSec10. Lecture Notes in Computer Science
, vol.6370
, pp. 23-34
-
-
Hernandez-Castro, J.C.1
Peris-Lopez, P.2
Phan, R.C.W.3
Estevez-Tapiador, J.M.4
-
28
-
-
70349284581
-
Secure Human Identification Protocols
-
Advances in Cryptology - ASIACRYPT 2001
-
Hopper N, Blum M. Secure human identification protocols. Advances in cryptology - ASIACRYPT 2001. p. 5266; 2001. (Pubitemid 33371178)
-
(2002)
Lecture Notes in Computer Science
, Issue.2248
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
31
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
A. Juels, R. Rivest, and M. Szydlo The blocker tag: selective blocking of RFID tags for consumer privacy S. Jajodia, V. Atluri, T. Jaeger, Conference on computer and communications security - ACM CCS03 2003 ACM Press Washington, DC, USA 103 111 (Pubitemid 40673793)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
32
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
V. Shoup, IACR, Springer Santa Barbara, California, USA
-
A. Juels, and S. Weis Authenticating pervasive devices with human protocols V. Shoup, Advances in cryptology - CRYPTO05. Lecture notes in computer science vol. 3126 2005 IACR, Springer Santa Barbara, California, USA 293 308
-
(2005)
Advances in Cryptology - CRYPTO05. Lecture Notes in Computer Science
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.2
-
33
-
-
34547687590
-
Defining strong privacy for RFID
-
DOI 10.1109/PERCOMW.2007.37, 4144854, Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
-
A. Juels, and S. Weis Defining strong privacy for RFID International conference on pervasive computing and communications - PerCom 2007 2007 IEEE Computer Society New York City, New York, USA 342 347 (Pubitemid 47214235)
-
(2007)
Proceedings - Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2007
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
35
-
-
33749410503
-
Privacy enhanced active RFID tag
-
Munich, Germany; May
-
Kinoshita S, Ohkubo M, Hoshino F, Morohashi G, Shionoiri Q, Kanai A. Privacy enhanced active RFID tag. In: International workshop on exploiting context histories in smart environments - ECHISE05. Munich, Germany; May 2005.
-
(2005)
International Workshop on Exploiting Context Histories in Smart Environments - ECHISE05
-
-
Kinoshita, S.1
Ohkubo, M.2
Hoshino, F.3
Morohashi, G.4
Shionoiri, Q.5
Kanai, A.6
-
37
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on RFID?
-
Graz, Austria: Ecrypt; July
-
Kumar S, Paar C. Are standards compliant elliptic curve cryptosystems feasible on RFID? In: Workshop on RFID security - RFIDSec06. Graz, Austria: Ecrypt; July 2006.
-
(2006)
Workshop on RFID Security - RFIDSec06
-
-
Kumar, S.1
Paar, C.2
-
40
-
-
70450286845
-
Security analysis on a family of ultra-lightweight RFID authentication protocols
-
T. Li, G. Wang, and R.H. Deng Security analysis on a family of ultra-lightweight RFID authentication protocols Journal of Software 3 3 2008 1
-
(2008)
Journal of Software
, vol.3
, Issue.3
, pp. 1
-
-
Li, T.1
Wang, G.2
Deng, R.H.3
-
42
-
-
36248977046
-
Security analysis of two ultra-lightweight RFID authentication protocols
-
H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Von Solms, IFIP, Springer Sandton, Gauteng, South Africa
-
T. Li, and G. Wang Security analysis of two ultra-lightweight RFID authentication protocols H. Venter, M. Eloff, L. Labuschagne, J. Eloff, R. Von Solms, IFIP TC-11 22nd international information security conference - SEC 2007 vol. 232 2007 IFIP, Springer Sandton, Gauteng, South Africa 109 120
-
(2007)
IFIP TC-11 22nd International Information Security Conference - SEC 2007
, vol.232
, pp. 109-120
-
-
Li, T.1
Wang, G.2
-
43
-
-
14844294769
-
Privacy and security in library RFID issues, practices, and architectures
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
D. Molnar, and D. Wagner Privacy and security in library RFID: issues, practices, and architectures V. Atluri, B. Pfitzmann, P.D. McDaniel, Conference on computer and communications security - ACM CCS04 2004 ACM Press Washington, DC, USA 210 219 (Pubitemid 40338202)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Molnar, D.1
Wagner, D.2
-
44
-
-
34247523203
-
HB-MP: A further step in the HB-family of lightweight authentication protocols
-
DOI 10.1016/j.comnet.2007.01.011, PII S1389128607000242, Advances in Smart Cards
-
J. Munilla, and A. Peinado HB-MP: a further step in the HB-family of lightweight authentication protocols Computer Networks 51 9 2007 2262 2267 (Pubitemid 46654842)
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2262-2267
-
-
Munilla, J.1
Peinado, A.2
-
46
-
-
84856218376
-
-
SL2S2002; SL2S2102. ICODE SLIX; January
-
Datasheet NXP. SL2S2002; SL2S2102. ICODE SLIX; January 2011.
-
(2011)
Datasheet NXP
-
-
-
47
-
-
24944575863
-
Cryptographic approach to privacy-friendly tags
-
MIT Massachusetts, USA
-
M. Ohkubo, K. Suzuki, and S. Kinoshita Cryptographic approach to privacy-friendly tags RFID privacy workshop 2003 MIT Massachusetts, USA
-
(2003)
RFID Privacy Workshop
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
49
-
-
33845455482
-
EMAP: An efficient mutual-authentication protocol for low-cost RFID tags
-
On the Move to Meaningful Internet Syst. 2006: OTM 2006 Workshops - OTM Confed. Int. Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerS
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda EMAP: an efficient mutual authentication protocol for low-cost RFID tags OTM federated conferences and workshop: IS workshop - IS06. Lecture notes in computer science vol. 4277 2006 Springer Montpellier, France 352 361 (Pubitemid 44891824)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4277
, pp. 352-361
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
51
-
-
33750067948
-
2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
-
Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags J. Ma, H. Jin, L. Tianruo Yang, J.J.P. Tsai, International conference on ubiquitous intelligence and computing - UIC06. Lecture notes in computer science vol. 4259 2006 Springer Wuhan and Three Gorges, China 912 923 (Pubitemid 44577871)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4159
, pp. 912-923
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Ribagorda, A.4
-
52
-
-
84865472816
-
Security flaws in a recent ultralightweight RFID protocol
-
IOS Press Singapore, Republic of Singapore
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and J.C.A. van der Lubbe Security flaws in a recent ultralightweight RFID protocol Workshop on RFID security - RFIDSec Asia10. Cryptology and information security vol. 4 2010 IOS Press Singapore, Republic of Singapore 83 93
-
(2010)
Workshop on RFID Security - RFIDSec Asia10. Cryptology and Information Security
, vol.4
, pp. 83-93
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Estevez-Tapiador, J.M.3
Van Der Lubbe, J.C.A.4
-
53
-
-
79960803910
-
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol
-
Springer Shanghai, China
-
P. Peris-Lopez, J.C. Hernandez-Castro, R.C.-W. Phan, M.E. Tapiador, and T. Li Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol 6th China international conference on information security and cryptology - Inscrypt10 2010 Springer Shanghai, China
-
(2010)
6th China International Conference on Information Security and Cryptology - Inscrypt10
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.C.2
Phan, R.C.-W.3
Tapiador, M.E.4
Li, T.5
-
54
-
-
70450265312
-
Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI
-
R.C.-W. Phan Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI IEEE Transactions on Dependable and Secure Computing 6 2008 316 320
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, pp. 316-320
-
-
Phan, R.C.-W.1
-
55
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing - Second International Conference, SPC 2005, Proceedings
-
K. Rhee, J. Kwak, S. Kim, and D. Won Challenge-Response based RFID authentication protocol for distributed database environment D. Hutter, M. Ullmann, International conference on security in pervasive computing - SPC 2005. Lecture notes in computer science vol. 3450 2005 Springer Boppard, Germany 70 84 (Pubitemid 41274193)
-
(2005)
Lecture Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
59
-
-
44649155143
-
A family of dunces: Trivial RFID identification and authentication protocols
-
Tsudik G. A family of dunces: trivial RFID identification and authentication protocols. Cryptology ePrint Archive, Report 2006/015; 2007.
-
(2007)
Cryptology EPrint Archive, Report 2006/015
-
-
Tsudik, G.1
-
62
-
-
21144438831
-
Security and privacy aspects of low-cost radio frequency identification systems
-
D. Hutter, G. Müller, W. Stephan, M. Hutter, Springer Boppard, Germany
-
S. Weis, S. Sarma, R. Rivest, and D. Engels Security and privacy aspects of low-cost radio frequency identification systems D. Hutter, G. Müller, W. Stephan, M. Hutter, International conference on security in pervasive computing - SPC 2003. Lecture notes in computer science vol. 2802 2003 Springer Boppard, Germany 454 469
-
(2003)
International Conference on Security in Pervasive Computing - SPC 2003. Lecture Notes in Computer Science
, vol.2802
, pp. 454-469
-
-
Weis, S.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|