-
1
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Aug
-
M. Feldhofer, S. Dominikus, and J.Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. CHES, vol. 3156. Aug. 2004, pp. 357-370.
-
(2004)
Proc. CHES
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
2
-
-
34547991429
-
Design and implementation of low-area and low-power AES encryption hardware core
-
DOI 10.1109/DSD.2006.40, 1690090, Proceedings of the 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools, DSD 2006
-
P. Hämäläinen, T. Alho, M. Hännikäinen, and T. D. Hämäläinen, "Design and implementation of low-area and low-power AES encryption hardware core," in Proc. 9th EUROMICRO Conf. Digit. Syst. Design, Sep. 2006, pp. 577-583. (Pubitemid 47271529)
-
(2006)
Proceedings of the 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools, DSD 2006
, pp. 577-583
-
-
Hamalainen, P.1
Alho, T.2
Hannikainen, M.3
Hamalainen, T.D.4
-
3
-
-
50249094520
-
Public-key cryptography for RFID-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public-key cryptography for RFID-tags," in Proc. RFIDsec, 2006, pp. 1-16.
-
(2006)
Proc. RFIDsec
, pp. 1-16
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
4
-
-
33745654539
-
RFID-Tags for anti-counterfeiting
-
Topics in Cryptology - CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, Proceedings
-
P. Tuyls and L. Batina, "RFID-tags for anti-counterfeiting," in Topics in Cryptology, vol. 3860, D. Pointcheval, Ed. New York: Springer-Verlag, 2006, pp. 115-131. (Pubitemid 43971705)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 3960
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
9
-
-
0347227352
-
-
Nov.). FIPS-197: Advanced Encryption Standard, Gaithersburg, MD
-
National Institute of Standards and Technology. (2001, Nov.). FIPS-197: Advanced Encryption Standard, Gaithersburg, MD [Online]. Available: http://www.itl.nist.gov/fipspubs/
-
(2001)
National Institute of Standards and Technology
-
-
-
10
-
-
0347227352
-
-
FIPS-186-3: Digital Signature Standard (DSS)
-
National Institute of Standards and Technology. (2009). FIPS-186-3: Digital Signature Standard (DSS), [Online]. Available: http://www.itl.nist.gov/ fipspubs/
-
(2009)
National Institute of Standards and Technology
-
-
-
11
-
-
80055006043
-
Hardware implementation of a flexible tag platform for passive RFID devices
-
Aug
-
T. Plos and M. Feldhofer, "Hardware implementation of a flexible tag platform for passive RFID devices," in Proc. 14th Euromicro Conf. Digit. Syst. Design, Aug. 2011, pp. 293-300.
-
(2011)
Proc. 14th Euromicro Conf. Digit. Syst. Design
, pp. 293-300
-
-
Plos, T.1
Feldhofer, M.2
-
12
-
-
84884900781
-
-
Security and Chip Card ICs SLE 88CFX4000P, Neubiberg, Germany
-
Infineon Technologies AG. (2003). Security and Chip Card ICs SLE 88CFX4000P, Neubiberg, Germany [Online]. Available: http://www.icon-line.cn/iol/ datasheet/sle88cfx4000p-1310434.pdf
-
(2003)
Infineon Technologies AG
-
-
-
13
-
-
82155182510
-
-
LPC1000(L)-32-bit MCU, Eindhoven, The Netherlands
-
NXP Semiconductors. (2011). LPC1000(L)-32-bit MCU, Eindhoven, The Netherlands [Online]. Available: http://www.nxp.com
-
(2011)
NXP Semiconductors
-
-
-
14
-
-
0347227352
-
-
Oct. FIPS-180-3: Secure Hash Standard, Gaithersburg, MD
-
National Institute of Standards and Technology. (2008, Oct.). FIPS-180-3: Secure Hash Standard, Gaithersburg, MD [Online]. Available: http://www.itl.nist.gov/fipspubs/
-
(2008)
National Institute of Standards and Technology
-
-
-
15
-
-
84944891917
-
m)
-
Cryptographic Hardware and Embedded Systems - CHES 2001
-
J. Großschädl, "A bit-serial unified multiplier architecture for finite fields GF(p) and GF(2m)," in Proc. CHES, vol. 2162. May 2001, pp. 202-219. (Pubitemid 33329065)
-
(2001)
Lecture Notes in Computer Science
, Issue.2162
, pp. 202-219
-
-
Grossschadl, J.1
-
16
-
-
70350639755
-
ECC is ready for RFID - A proof in silicon
-
Berlin, Germany: Springer-Verlag, Sep
-
D. Hein, J. Wolkerstorfer, and N. Felber, "ECC is ready for RFID-a proof in silicon," in Selected Areas in Cryptography. Berlin, Germany: Springer-Verlag, Sep. 2008, pp. 401-413.
-
(2008)
Selected Areas in Cryptography
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
17
-
-
33746739905
-
AES implementation on a grain of sand
-
Oct
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, "AES implementation on a grain of sand," IEEE Proc. Inf. Security, vol. 152, no. 1, pp. 13-20, Oct. 2005.
-
(2005)
IEEE Proc. Inf. Security
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
18
-
-
79958773796
-
A cryptographic processor for low-resource devices: Canning ECDSA and AES like sardines
-
New York: Springer-Verlag
-
M. Hutter, M. Feldhofer, and J. Wolkerstorfer, "A cryptographic processor for low-resource devices: Canning ECDSA and AES like sardines," in Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, vol. 6633. New York: Springer-Verlag, 2011, pp. 144-159.
-
(2011)
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
, vol.6633
, pp. 144-159
-
-
Hutter, M.1
Feldhofer, M.2
Wolkerstorfer, J.3
-
19
-
-
78650123975
-
An ECDSA processor for RFID authentication
-
M. Hutter, M. Feldhofer, and T. Plos, "An ECDSA processor for RFID authentication," in Proc. RFIDsec, vol. 6370. 2010, pp. 189-202.
-
(2010)
Proc. RFIDsec
, vol.6370
, pp. 189-202
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
-
21
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Jan
-
P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization," Math. Comput., vol. 48, no. 177, pp. 243-264, Jan. 1987.
-
(1987)
Math. Comput
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
22
-
-
84939573910
-
Differential power analysis
-
P. C. Kocher, J. Jaffe, and B. Jun, "Differential power analysis," in Proc. CRYPTO, 1999, pp. 388-397.
-
(1999)
Proc. CRYPTO
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
23
-
-
84862133320
-
Attacking an AES-enabled NFC tag: Implications from design to a real-world scenario
-
T. Korak, T. Plos, and M. Hutter, "Attacking an AES-enabled NFC tag: Implications from design to a real-world scenario," in Proc. COSADE, 2012, pp. 17-32.
-
(2012)
Proc. COSADE
, pp. 17-32
-
-
Korak, T.1
Plos, T.2
Hutter, M.3
-
24
-
-
84886425506
-
Semi-passive RFID development platform for implementing and attacking security tags
-
M. Feldhofer, M. J. Aigner, M. Hutter, T. Plos, E. Wenger, and T. Baier, "Semi-passive RFID development platform for implementing and attacking security tags," in Proc. Int. Conf. RISC, 2010, pp. 1-6.
-
(2010)
Proc. Int. Conf. RISC
, pp. 1-6
-
-
Feldhofer, M.1
Aigner, M.J.2
Hutter, M.3
Plos, T.4
Wenger, E.5
Baier, T.6
-
25
-
-
84884910328
-
-
AMS AG Styria, Austria
-
AMS AG. (2008). The AMS AG Website, Styria, Austria [Online]. Available: http://www.ams.com/
-
(2008)
The AMS AG Website
-
-
-
26
-
-
84884901201
-
-
RFID im Blick Aug. Amelinghausen, Deutschland
-
RFID im Blick. (2011, Aug.). Schlüssel zur Authentizität, Amelinghausen, Deutschland [Online]. Available: http://www.rfidim-blick.de/ images/stories/magazin/rib-flschungsschutz.%pdf
-
(2011)
Schlüssel Zur Authentizität
-
-
-
28
-
-
49949106662
-
Low power VLSI design for a RFID passive tag baseband system enhanced with an AES cryptography engine
-
Sep
-
A. S. Man, E. S. Zhang, V. K. Lau, C. Tsui, and H. C. Luong, "Low power VLSI design for a RFID passive tag baseband system enhanced with an AES cryptography engine," in Proc. Eurasia, Sep. 2007, pp. 1-6.
-
(2007)
Proc. Eurasia
, pp. 1-6
-
-
Man, A.S.1
Zhang, E.S.2
Lau, V.K.3
Tsui, C.4
Luong, H.C.5
-
29
-
-
57849111516
-
Design of a 2 W RFID baseband processor featuring an AES cryptography primitive
-
Sep
-
A. Ricci, M. Grisanti, I. De Munari, and P. Ciampolini, "Design of a 2 W RFID baseband processor featuring an AES cryptography primitive," in Proc. Int. Conf. Electron., Circuits Syst., Sep. 2008, pp. 376-379.
-
(2008)
Proc. Int. Conf. Electron., Circuits Syst
, pp. 376-379
-
-
Ricci, A.1
Grisanti, M.2
De Munari, I.3
Ciampolini, P.4
-
30
-
-
82955241402
-
A fully integrated high security NFC target IC using 0.18 m CMOS process
-
Sep
-
J.-W. Lee, D. H. T. Vo, S.-H. Hong, and Q.-H. Huynh, "A fully integrated high security NFC target IC using 0.18 m CMOS process," in Proc. ESSCIRC, Sep. 2011, pp. 551-554.
-
(2011)
Proc. ESSCIRC
, pp. 551-554
-
-
Lee, J.-W.1
Vo, D.H.T.2
Hong, S.-H.3
Huynh, Q.-H.4
|