-
1
-
-
35048859848
-
Strong Authentication for RFID Systems Using the AES Algorithm
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems Using the AES Algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
2
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293-308. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
3
-
-
27644472569
-
An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol
-
Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ - a Provably Secure Lightweight Authentication Protocol. IET Electronic Letters 41(21), 1169-1170 (2005)
-
(2005)
IET Electronic Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
4
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
DOI 10.1109/SECPERU.2006.10, 1644274, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
-
Bringer, J., Chabanne, H., Dottax, E.: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, pp. 28-33. IEEE Computer Society (2006) (Pubitemid 46028608)
-
(2006)
Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006
, vol.2006
, pp. 28-33
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
5
-
-
51349120734
-
Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks
-
Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339-4342 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.9
, pp. 4339-4342
-
-
Bringer, J.1
Chabanne, H.2
-
6
-
-
54249085502
-
+ Are Hard to Find
-
Tsudik, G. (ed.) FC 2008. Springer, Heidelberg
-
+ Are Hard to Find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156-170. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5143
, pp. 156-170
-
-
Gilbert, H.1
Robshaw, M.2
Seurin, Y.3
-
8
-
-
34547687590
-
Defining strong privacy for RFID
-
IEEE Computer Society
-
Juels, A., Weis, S.A.: Defining strong privacy for RFID. In: PERCOMW, pp. 342-347. IEEE Computer Society (2007)
-
(2007)
PERCOMW
, pp. 342-347
-
-
Juels, A.1
Weis, S.A.2
-
9
-
-
34748848124
-
Universally composable and forward-secure RFID authentication and authenticated key exchange
-
ACM
-
Le, T.V., Burmester, M., de Medeiros, B.: Universally composable and forward-secure RFID authentication and authenticated key exchange. In: ASIACCS 2007, pp. 242-252. ACM (2007)
-
(2007)
ASIACCS 2007
, pp. 242-252
-
-
Le, T.V.1
Burmester, M.2
De Medeiros, B.3
-
10
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
12
-
-
70350639755
-
ECC Is Ready for RFID - A Proof in Silicon
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID - A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401-413. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
13
-
-
77952337733
-
Low-Cost Untraceable Authentication Protocols for RFID
-
ACM
-
Lee, Y.K., Batina, L., Singelee, D., Verbauwhede, I.: Low-Cost Untraceable Authentication Protocols for RFID. In: Proceedings of the 3rd ACM Conference on Wireless Network Security, WiSec 2010, pp. 55-64. ACM (2010)
-
(2010)
Proceedings of the 3rd ACM Conference on Wireless Network Security, WiSec 2010
, pp. 55-64
-
-
Lee, Y.K.1
Batina, L.2
Singelee, D.3
Verbauwhede, I.4
-
14
-
-
49049105964
-
EC-RAC (ECDLP based Randomized Access Control): Provably Secure RFID Authentication Protocol
-
IEEE
-
Lee, Y.K., Batina, L., Verbauwhede, I.: EC-RAC (ECDLP based Randomized Access Control): Provably Secure RFID Authentication Protocol. In: IEEE International Conference on RFID 2008, pp. 97-104. IEEE (2008)
-
(2008)
IEEE International Conference on RFID 2008
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
15
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID Identification Protocol
-
Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. Springer, Heidelberg
-
Bringer, J., Chabanne, H., Icart, T.: Cryptanalysis of EC-RAC, a RFID Identification Protocol. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 149-161. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5339
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
16
-
-
78650089685
-
EC-RAC: Enriching a Capacious RFID Attack Collection
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
van Deursen, T., Radomirović, S.: EC-RAC: Enriching a Capacious RFID Attack Collection. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 75-90. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 75-90
-
-
Van Deursen, T.1
Radomirović, S.2
-
17
-
-
78650082766
-
On the Claimed Privacy of EC-RAC III
-
Ors Yalcin, S.B. (ed.) RFIDSec 2010. Springer, Heidelberg
-
Fan, J., Hermans, J., Vercauteren, F.: On the Claimed Privacy of EC-RAC III. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol. 6370, pp. 66-74. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6370
, pp. 66-74
-
-
Fan, J.1
Hermans, J.2
Vercauteren, F.3
-
18
-
-
70349268101
-
Untraceable RFID Authentication Protocols: Revision of EC-RAC
-
IEEE
-
Lee, Y.K., Batina, L., Verbauwhede, I.: Untraceable RFID Authentication Protocols: Revision of EC-RAC. In: IEEE International Conference on RFID, pp. 178-185. IEEE (2009)
-
(2009)
IEEE International Conference on RFID
, pp. 178-185
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
19
-
-
76749128991
-
Efficient zero-knowledge identification schemes which respect privacy
-
Bringer, J., Chabanne, H., Icart, T.: Efficient zero-knowledge identification schemes which respect privacy. In: Proceedings of ASIACCS, pp. 195-205 (2009)
-
(2009)
Proceedings of ASIACCS
, pp. 195-205
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
20
-
-
33749561582
-
On the fly authentication and signature schemes based on groups of unknown order
-
Girault, M., Poupard, G., Stern, J.: On the fly authentication and signature schemes based on groups of unknown order. J. Cryptology 19(4), 463-487 (2006)
-
(2006)
J. Cryptology
, vol.19
, Issue.4
, pp. 463-487
-
-
Girault, M.1
Poupard, G.2
Stern, J.3
|