메뉴 건너뛰기




Volumn , Issue , 2012, Pages 868-872

Lightweight mutual RFID authentication

Author keywords

Error correcting Code; McEliece; Mutual Authentication; Privacy; Public Key; RFID

Indexed keywords

AUTHENTICATION PROTOCOLS; BINARY OPERATIONS; COMPUTATIONAL OPERATIONS; ENCRYPTION AND DECRYPTION; ERROR CORRECTING CODE; MCELIECE; MCELIECE CRYPTOSYSTEM; MUTUAL AUTHENTICATION; PUBLIC KEYS; RADIOFREQUENCY IDENTIFICATION TAGS; RF-ID TAGS; RFID AUTHENTICATION; RFID SYSTEMS;

EID: 84871943693     PISSN: 15503607     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2012.6363871     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 70350633827 scopus 로고    scopus 로고
    • Reducing key length of the mceliece cryptosystem
    • Lecture Notes in Computer Science, 5580. Springer-Verlag
    • Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani. Reducing Key Length of the McEliece Cryptosystem. In Advances in Cryptology (AFRICACRYPT'09), Lecture Notes in Computer Science, vol. 5580, pages 77-97. Springer-Verlag, 2009.
    • (2009) Advances in Cryptology (AFRICACRYPT'09) , pp. 77-97
    • Berger, T.P.1    Cayrel, P.-L.2    Gaborit, P.3    Otmani, A.4
  • 4
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing, 4(4):337-340, 2007.
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 5
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • Lecture Notes in Computer Science, 3156. Springer-Verlag
    • Martin Feldhofer, Sandra Dominikus, and Johannes Wolkerstorfer. Strong authentication for RFID systems using the AES algorithm. In Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Lecture Notes in Computer Science, vol. 3156, pages 357-370. Springer-Verlag, 2004.
    • (2004) Workshop on Cryptographic Hardware and Embedded Systems (CHES'04) , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 6
    • 33845429016 scopus 로고    scopus 로고
    • A case against currently used hash functions in RFID protocols
    • Lecture Notes in Computer Science, vol. 4277. Springer- Verlag
    • Martin Feldhofer and Christian Rechberger. A Case Against Currently Used Hash Functions in RFID Protocols. In OTM 2006 Workshops, Lecture Notes in Computer Science, vol. 4277, pages 372-381. Springer- Verlag, 2006.
    • (2006) OTM 2006 Workshops , pp. 372-381
    • Feldhofer, M.1    Rechberger, C.2
  • 8
    • 84871963980 scopus 로고
    • International Organization for Standardization. ISO/IEC 9798-2: Information Technology Security techniques Entity Authentication Mechanisms. ISO/IEC
    • International Organization for Standardization. ISO/IEC 9798-2: Information Technology Security techniques Entity Authentication Mechanisms. Part 2: Entity authentication using symmetric techniques. ISO/IEC, 1993.
    • (1993) Part 2: Entity Authentication Using Symmetric Techniques
  • 10
    • 44449155290 scopus 로고    scopus 로고
    • HB#: Increasing the security and efficiency of HB+
    • Lecture Notes in Computer Science, vol. 4965, Springer
    • Henri Gilbert, Matthew J.B. Robshaw, and Yannick Seurin. HB#: increasing the security and efficiency of HB+. In Advances in Cryptology (Eurocrypt'08), Lecture Notes in Computer Science, vol. 4965, pages 361-378. Springer, 2008.
    • (2008) Advances in Cryptology (Eurocrypt'08) , pp. 361-378
    • Gilbert, H.1    Robshaw, M.J.B.2    Seurin, Y.3
  • 11
    • 27644472569 scopus 로고    scopus 로고
    • An active attack against HB+: A provably secure lightweight authentication protocol
    • Henri Gilbert, Matthew J.B. Robshaw, and Herv Sibert. An Active Attack Against HB+: A Provably Secure Lightweight Authentication Protocol. IEE Electronics Letters, 41(21):1169-1170, 2005.
    • (2005) IEE Electronics Letters , vol.41 , Issue.21 , pp. 1169-1170
    • Gilbert, H.1    Robshaw, B.M.J.2    Sibert, H.3
  • 13
    • 30344469114 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Lecture Notes in Computer Science, vol. 3126, Springer
    • Ari Juels and Stephen A. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology (Crypto'05), Lecture Notes in Computer Science, vol. 3126, pages 198-293. Springer, 2005.
    • (2005) Advances in Cryptology (Crypto'05) , pp. 198-198
    • Juels, A.1    Weis, S.A.2
  • 14
    • 84871971448 scopus 로고    scopus 로고
    • RSA Laboratories. Online, August
    • RSA Laboratories. Technical Characteristics of RFID. Online, August 2010. http://www.rsa.com/rsalabs/node.asp?id=2121.
    • (2010) Technical Characteristics of RFID
  • 15
    • 84871996294 scopus 로고    scopus 로고
    • Private identification of RFID tags
    • Lecture Notes in Computer Science. Springer-Verlag
    • Behzad Malek and Ali Miri. Private Identification of RFID Tags. In Foundations & Practice of Security, Lecture Notes in Computer Science, pages 352-361. Springer-Verlag, 2011.
    • (2011) Foundations & Practice of Security , pp. 352-361
    • Malek, B.1    Miri, A.2
  • 17
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • ACM, ACM Press
    • David Molnar and David Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In Conference on Computer and Communications Security (CCS'04), pages 210-219. ACM, ACM Press, 2004.
    • (2004) Conference on Computer and Communications Security (CCS'04) , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 18
    • 85038209127 scopus 로고    scopus 로고
    • Textitsemantic security for the McEliece cryptosystem without random oracles
    • Ryo Nojima, Hideki Imai, Kazukuni Kobara, and Kirill Morozov. textitSemantic security for the McEliece cryptosystem without random oracles. Designs, Codes and Cryptography, 49(1):289-305, 2008.
    • (2008) Designs, Codes and Cryptography , vol.49 , Issue.1 , pp. 289-305
    • Nojima, R.1    Imai, H.2    Kobara, K.3    Morozov, K.4
  • 21
    • 24144483054 scopus 로고    scopus 로고
    • Efficient AES implementations on ASICs and FPGAs
    • Lecture Notes in Computer Science, vol. 3373, Springer
    • Norbert Pramstaller, Stefan Mangard, Sandra Dominikus, and Johannes Wolkerstorfer. Efficient AES Implementations on ASICs and FPGAs. In Advanced Encryption Standard (AES'05), Lecture Notes in Computer Science, vol. 3373, pages 98-112. Springer, 2005.
    • (2005) Advanced Encryption Standard (AES'05) , pp. 98-112
    • Pramstaller, N.1    Mangard, S.2    Dominikus, S.3    Wolkerstorfer, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.