-
2
-
-
54349101762
-
LAMED a PRNG for EPC Class-1 Generation-2 RFID specification
-
Dec
-
P. Peris-Lopez, J. Hernandez-Castro, J. Estevez-Tapiador, and A. Ribagorda, "LAMED a PRNG for EPC Class-1 Generation-2 RFID specification," Computer Standards & Interfaces, pp. 88-97, Dec. 2007.
-
(2007)
Computer Standards & Interfaces
, pp. 88-97
-
-
Peris-Lopez, P.1
Hernandez-Castro, J.2
Estevez-Tapiador, J.3
Ribagorda, A.4
-
3
-
-
57049128814
-
Dismantling MIFARE classic
-
F. Garcia, G. Koning, R. Muijrers, P. van Rossum, R. Verdult, R. Wichers, and B. Jacobs, "Dismantling MIFARE Classic," in Computer Security - ESORICS 2008, 2008, pp. 97-114.
-
(2008)
Computer Security - ESORICS 2008
, pp. 97-114
-
-
Garcia, F.1
Koning, G.2
Muijrers, R.3
Van Rossum, P.4
Verdult, R.5
Wichers, R.6
Jacobs, B.7
-
4
-
-
0029252184
-
Built-in test for circuits with scan based on reseeding of multiplepolynomial linear feedback shift registers
-
Feb
-
S. Hellebrand, J. Rajskia, S. Tarnick, S. Venkataraman, and B. Courtois, "Built-in test for circuits with scan based on reseeding of multiplepolynomial linear feedback shift registers," Computers, IEEE Transactions on, vol. 44, no. 2, pp. 223-233, Feb. 1995.
-
(1995)
Computers, IEEE Transactions on
, vol.44
, Issue.2
, pp. 223-233
-
-
Hellebrand, S.1
Rajskia, J.2
Tarnick, S.3
Venkataraman, S.4
Courtois, B.5
-
5
-
-
0041430717
-
Dual multiple-polynomial LFSR for low-power mixed-mode BIST
-
Jul
-
P. Rosinger, B. Al-Hashimi, and N. Nicolici, "Dual multiple-polynomial LFSR for low-power mixed-mode BIST," Computers and Digital Techniques, IEEE Proceedings on, vol. 150, no. 4, pp. 209-217, Jul. 2003.
-
(2003)
Computers and Digital Techniques, IEEE Proceedings on
, vol.150
, Issue.4
, pp. 209-217
-
-
Rosinger, P.1
Al-Hashimi, B.2
Nicolici, N.3
-
7
-
-
84889997751
-
-
Chapter 16. Springer, Nov., ch. A Random Number Generator for Application in RFID Tags
-
W. Che, H.Deng, X. Tan, and J. Wang, Networked RFID Systems and Lightweight Cryptography, Chapter 16. Springer, Nov. 2008, ch. A Random Number Generator for Application in RFID Tags, pp. 279-287.
-
(2008)
Networked RFID Systems and Lightweight Cryptography
, pp. 279-287
-
-
Che, W.1
Deng, H.2
Tan, X.3
Wang, J.4
-
8
-
-
4644219636
-
-
(Last access Feb. 2010). [Online]
-
M. Haahr, "True random number service," 2010, (Last access Feb. 2010). [Online]. Available: http://www.random.org
-
(2010)
True Random Number Service
-
-
Haahr, M.1
-
11
-
-
77649254223
-
New designs in lightweight symmetric encryption
-
P. Kitsos and Y. Zhang, Eds. Springer US, [Online]
-
C. Paar, A. Poschmann, and M. Robshaw, "New Designs in Lightweight Symmetric Encryption," in RFID Security, P. Kitsos and Y. Zhang, Eds. Springer US, 2009, pp. 349-371. [Online]. Available: http://dx.doi.org/10.1007/ 978-0-387-76481-8-14
-
(2009)
RFID Security
, pp. 349-371
-
-
Paar, C.1
Poschmann, A.2
Robshaw, M.3
-
12
-
-
0029720432
-
Modeling and simulation of oscillator-based random number generators
-
May
-
C. Petrie and J. Connelly, "Modeling and simulation of oscillator-based random number generators," in Circuits and Systems, IEEE International Symposium on, vol. 4, May 1996, pp. 324-327.
-
(1996)
Circuits and Systems, IEEE International Symposium on
, vol.4
, pp. 324-327
-
-
Petrie, C.1
Connelly, J.2
-
14
-
-
79952604291
-
Hardware implementation of symmetric algorithms for RFID security
-
P. Kitsos and Y. Zhang, Eds. Springer US
-
M. Feldhofer and J. Wolkerstorfer, "Hardware Implementation of Symmetric Algorithms for RFID Security," in RFID Security, P. Kitsos and Y. Zhang, Eds. Springer US, 2009, pp. 373-415.
-
(2009)
RFID Security
, pp. 373-415
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
-
15
-
-
84856519904
-
-
INRIA and Orange Labs, Tech. Rep., deliverable for RFID-AP
-
J. Etrog, M. Robshaw, and O. Savry, "The possibilities and limitations of cryptography in constrained devices," INRIA and Orange Labs, Tech. Rep., 2009, deliverable for RFID-AP.
-
(2009)
The Possibilities and Limitations of Cryptography in Constrained Devices
-
-
Etrog, J.1
Robshaw, M.2
Savry, O.3
-
16
-
-
79955516076
-
Ultra low-voltage analog circuits for UHF RFID devices in 180 nm CMOS technology
-
A. Boni and A. Facen, "Ultra low-voltage analog circuits for UHF RFID devices in 180 nm CMOS technology," Analog Integrated Circuits and Signal Processing, vol. 63, no. 3, pp. 359-367, 2010.
-
(2010)
Analog Integrated Circuits and Signal Processing
, vol.63
, Issue.3
, pp. 359-367
-
-
Boni, A.1
Facen, A.2
-
17
-
-
84856544772
-
The tag authentication scheme using self-shrinking generator on RFID system
-
H. Lee and D. Hong, "The tag authentication scheme using self-shrinking generator on RFID system," International Journal of Applied Science, Engineering and Technology, vol. 3, pp. 33-38, 2007.
-
(2007)
International Journal of Applied Science, Engineering and Technology
, vol.3
, pp. 33-38
-
-
Lee, H.1
Hong, D.2
-
18
-
-
84974670663
-
The shrinking generator
-
Springer
-
D. Coppersmith, H. Krawczyk, and Y. Mansour, "The shrinking generator," in Advances in Cryptology - Crypto'93. Springer, 1994, pp. 22-39.
-
(1994)
Advances in Cryptology - Crypto'93
, pp. 22-39
-
-
Coppersmith, D.1
Krawczyk, H.2
Mansour, Y.3
-
20
-
-
79959214861
-
A practical implementation attack on weak pseudorandom number generator designs for EPC GEN2 tags
-
DOI: 10.1007/s11277-010-0187-1
-
J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomartí, "A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags," Wireless Personal Communications, vol. 59, no. 1, pp. 27 - 42, 2011, DOI: 10.1007/s11277-010-0187-1.
-
(2011)
Wireless Personal Communications
, vol.59
, Issue.1
, pp. 27-42
-
-
Melia-Segui, J.1
Garcia-Alfaro, J.2
Herrera-Joancomartí, J.3
-
21
-
-
56349117175
-
-
Ecrypt, Tech. Rep., 2008. [Online]
-
C. De Canniere and B. Preneel, "Trivium specifications," Ecrypt, Tech. Rep., 2008. [Online]. Available: http://www.ecrypt.eu.org/stream/ triviump3.html
-
Trivium Specifications
-
-
De Canniere, C.1
Preneel, B.2
-
22
-
-
84886703527
-
Grain: A stream cipher for constrained environments
-
Nov
-
M. Hell, T. Johansson, and W. Meier, "Grain: a stream cipher for constrained environments," International Journal of Wireless and Mobile Computing, vol. 2, no. 1, pp. 86-93, Nov. 2007.
-
(2007)
International Journal of Wireless and Mobile Computing
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
|