메뉴 건너뛰기




Volumn , Issue , 2011, Pages 3820-3825

Multiple-polynomial LFSR based pseudorandom number generator for EPC Gen2 RFID tags

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE IMPLEMENTATIONS; LINEAR FEEDBACK SHIFT REGISTERS; MULTIPLE FEEDBACK; PSEUDO RANDOM NUMBER GENERATORS; RF-ID TAGS;

EID: 84856529125     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IECON.2011.6119932     Document Type: Conference Paper
Times cited : (24)

References (22)
  • 4
    • 0029252184 scopus 로고
    • Built-in test for circuits with scan based on reseeding of multiplepolynomial linear feedback shift registers
    • Feb
    • S. Hellebrand, J. Rajskia, S. Tarnick, S. Venkataraman, and B. Courtois, "Built-in test for circuits with scan based on reseeding of multiplepolynomial linear feedback shift registers," Computers, IEEE Transactions on, vol. 44, no. 2, pp. 223-233, Feb. 1995.
    • (1995) Computers, IEEE Transactions on , vol.44 , Issue.2 , pp. 223-233
    • Hellebrand, S.1    Rajskia, J.2    Tarnick, S.3    Venkataraman, S.4    Courtois, B.5
  • 8
    • 4644219636 scopus 로고    scopus 로고
    • (Last access Feb. 2010). [Online]
    • M. Haahr, "True random number service," 2010, (Last access Feb. 2010). [Online]. Available: http://www.random.org
    • (2010) True Random Number Service
    • Haahr, M.1
  • 11
    • 77649254223 scopus 로고    scopus 로고
    • New designs in lightweight symmetric encryption
    • P. Kitsos and Y. Zhang, Eds. Springer US, [Online]
    • C. Paar, A. Poschmann, and M. Robshaw, "New Designs in Lightweight Symmetric Encryption," in RFID Security, P. Kitsos and Y. Zhang, Eds. Springer US, 2009, pp. 349-371. [Online]. Available: http://dx.doi.org/10.1007/ 978-0-387-76481-8-14
    • (2009) RFID Security , pp. 349-371
    • Paar, C.1    Poschmann, A.2    Robshaw, M.3
  • 12
  • 14
    • 79952604291 scopus 로고    scopus 로고
    • Hardware implementation of symmetric algorithms for RFID security
    • P. Kitsos and Y. Zhang, Eds. Springer US
    • M. Feldhofer and J. Wolkerstorfer, "Hardware Implementation of Symmetric Algorithms for RFID Security," in RFID Security, P. Kitsos and Y. Zhang, Eds. Springer US, 2009, pp. 373-415.
    • (2009) RFID Security , pp. 373-415
    • Feldhofer, M.1    Wolkerstorfer, J.2
  • 16
    • 79955516076 scopus 로고    scopus 로고
    • Ultra low-voltage analog circuits for UHF RFID devices in 180 nm CMOS technology
    • A. Boni and A. Facen, "Ultra low-voltage analog circuits for UHF RFID devices in 180 nm CMOS technology," Analog Integrated Circuits and Signal Processing, vol. 63, no. 3, pp. 359-367, 2010.
    • (2010) Analog Integrated Circuits and Signal Processing , vol.63 , Issue.3 , pp. 359-367
    • Boni, A.1    Facen, A.2
  • 20
    • 79959214861 scopus 로고    scopus 로고
    • A practical implementation attack on weak pseudorandom number generator designs for EPC GEN2 tags
    • DOI: 10.1007/s11277-010-0187-1
    • J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomartí, "A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags," Wireless Personal Communications, vol. 59, no. 1, pp. 27 - 42, 2011, DOI: 10.1007/s11277-010-0187-1.
    • (2011) Wireless Personal Communications , vol.59 , Issue.1 , pp. 27-42
    • Melia-Segui, J.1    Garcia-Alfaro, J.2    Herrera-Joancomartí, J.3
  • 21
    • 56349117175 scopus 로고    scopus 로고
    • Ecrypt, Tech. Rep., 2008. [Online]
    • C. De Canniere and B. Preneel, "Trivium specifications," Ecrypt, Tech. Rep., 2008. [Online]. Available: http://www.ecrypt.eu.org/stream/ triviump3.html
    • Trivium Specifications
    • De Canniere, C.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.