메뉴 건너뛰기




Volumn 7235 LNCS, Issue , 2012, Pages 318-329

PUF-based RFID authentication protocol against secret key leakage

Author keywords

Authentication; Physical Unclonable Function; Protocol; RFID; Security

Indexed keywords

ASYNCHRONIZATION; AUTHENTICATION PROTOCOLS; KEY EXPOSURE; MAN IN THE MIDDLE ATTACKS; NEW PROTOCOL; PHYSICAL ATTACKS; PHYSICAL UNCLONABLE FUNCTIONS; REPLAY ATTACK; RF-ID TAGS; RFID AUTHENTICATION; RFID SYSTEMS; SECRET KEY; SECURITY; SECURITY AND PRIVACY ISSUES; SECURITY PROPERTIES;

EID: 84859730387     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29253-8_27     Document Type: Conference Paper
Times cited : (12)

References (28)
  • 1
    • 84856099707 scopus 로고    scopus 로고
    • Side-channel analysis of cryptographic rfids with analog demodulation
    • Juels, A., Paar, C. (eds.). Springer, Heidelberg
    • Kasper, T., Oswald, D., Paar, C.: Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 61-77. Springer, Heidelberg (2012)
    • (2012) RFIDSec 2011. LNCS , vol.7055 , pp. 61-77
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 2
    • 52949116081 scopus 로고    scopus 로고
    • A Practical attack on the mifare classic
    • Grimaud, G., Standaert, F.-X. (eds.). Springer, Heidelberg
    • de Koning Gans, G., Hoepman, J.-H., Garcia, F.D.: A Practical Attack on the MIFARE Classic. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 267-282. Springer, Heidelberg (2008)
    • (2008) CARDIS 2008. LNCS , vol.5189 , pp. 267-282
    • De Koning Gans, G.1    Hoepman, J.-H.2    Garcia, F.D.3
  • 8
    • 77953303552 scopus 로고    scopus 로고
    • Lightweight mutual authentication and ownership transfer for RFID systems
    • Kulseng, L., Yu, Z., Wei, Y., Guan, Y.: Lightweight mutual authentication and ownership transfer for RFID systems. In: Proceedings IEEE INFOCOM. IEEE (2010)
    • (2010) Proceedings IEEE INFOCOM. IEEE
    • Kulseng, L.1    Yu, Z.2    Wei, Y.3    Guan, Y.4
  • 14
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost rfid tags
    • Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.). Springer, Heidelberg
    • Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol. 4159, pp. 912-923. Springer, Heidelberg (2006)
    • (2006) UIC 2006. LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 16
    • 33745654539 scopus 로고    scopus 로고
    • RFID-Tags for anti-counterfeiting
    • Pointcheval, D. (ed.). Springer, Heidelberg
    • Tuyls, P., Batina, L.: RFID-Tags for Anti-counterfeiting. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 115-131. Springer, Heidelberg (2006)
    • (2006) CT-RSA 2006. LNCS , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 17
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • Chien, H.-Y., Chen, C.-H.: Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces 29(2), 254-259 (2007)
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 254-259
    • Chien, H.-Y.1    Chen, C.-H.2
  • 23
    • 76649139469 scopus 로고    scopus 로고
    • PUF-based authentication protocols -revisited
    • Youm, H.Y., Yung, M. (eds.). Springer, Heidelberg
    • Busch, H., Katzenbeisser, S., Baecher, P.: PUF-Based Authentication Protocols -Revisited. In: Youm, H.Y., Yung, M. (eds.) WISA 2009. LNCS, vol. 5932, pp. 296-308. Springer, Heidelberg (2009)
    • (2009) WISA 2009. LNCS , vol.5932 , pp. 296-308
    • Busch, H.1    Katzenbeisser, S.2    Baecher, P.3
  • 25
    • 84859704281 scopus 로고    scopus 로고
    • Physical unclonable functions and secure processors
    • Clavier, C., Gaj, K. (eds.). Springer, Heidelberg
    • Devadas, S.: Physical Unclonable Functions and Secure Processors. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 65-65. Springer, Heidelberg (2009)
    • (2009) CHES 2009. LNCS , vol.5747 , pp. 65-65
    • Devadas, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.