메뉴 건너뛰기




Volumn 8, Issue 11, 2013, Pages 2880-2887

A lightweight RFID authentication protocol based on elliptic curve cryptography

Author keywords

Elliptic curve cryptography (ECC); Lightweight; Public Key cryptography (PKC); RFID

Indexed keywords

ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOGRAPHY(ECC); LIGHTWEIGHT; MUTUAL AUTHENTICATION; PUBLIC KEY CRYPTOGRAPHY (PKC); RFID AUTHENTICATION PROTOCOLS; ROBUST AUTHENTICATION PROTOCOLS; SECURITY AND PRIVACY;

EID: 84887275465     PISSN: 1796203X     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcp.8.11.2880-2887     Document Type: Article
Times cited : (21)

References (25)
  • 2
    • 33144457479 scopus 로고    scopus 로고
    • RFID Security and Privacy: A Research Survey
    • A. Juels, "RFID Security and Privacy: A Research Survey, " IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp. 381-394, 2006.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 4
    • 84875171185 scopus 로고    scopus 로고
    • Security Protocol for RFID System Conforming to EPC-C1G2 Standard
    • F. Xiao, Y. Zhou, J. Zhou, et al, "Security Protocol for RFID System Conforming to EPC-C1G2 Standard, " Journal of Computers, Vol.8, No.3, pp. 605-612, 2013.
    • (2013) Journal of Computers , vol.8 , Issue.3 , pp. 605-612
    • Xiao, F.1    Zhou, Y.2    Zhou, J.3
  • 5
    • 84883728510 scopus 로고    scopus 로고
    • An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    • X. Ren, X. Xu, Y. Li, "An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol, " Journal of Computers, Vol.8, No.9, pp. 2405-2412, 2013.
    • (2013) Journal of Computers , vol.8 , Issue.9 , pp. 2405-2412
    • Ren, X.1    Xu, X.2    Li, Y.3
  • 7
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • LNCS 4833, Springer-Verlag, Berlin
    • S. Vaudenay, "On Privacy Models for RFID, " Proc. Adances in Cryptology (ASIA CRYPT'07), LNCS 4833, Springer-Verlag, Berlin, pp. 68-87, 2007.
    • (2007) Proc. Adances in Cryptology (ASIA CRYPT'07) , pp. 68-87
    • Vaudenay, S.1
  • 8
  • 9
    • 54049143316 scopus 로고    scopus 로고
    • Elliptic Curve based Security Processor for RFID
    • Y.-K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic Curve based Security Processor for RFID, " IEEE Trans. Comput. Vol.57, No.4, pp. 1514-1527, 2008.
    • (2008) IEEE Trans. Comput. , vol.57 , Issue.4 , pp. 1514-1527
    • Lee, Y.-K.1    Sakiyama, K.2    Batina, L.3    Verbauwhede, I.4
  • 15
    • 77952285870 scopus 로고    scopus 로고
    • Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements
    • July
    • H. Y. Chien and C. W. Huang, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements, " ACM Operating System Rev., Vol. 41, No. 2, pp. 83-86, July, 2007.
    • (2007) ACM Operating System Rev , vol.41 , Issue.2 , pp. 83-86
    • Chien, H.Y.1    Huang, C.W.2
  • 16
    • 34548353243 scopus 로고    scopus 로고
    • Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?
    • Graz, July
    • J. Wolkerstorfer, "Is Elliptic Curve Cryptography Suitable to Secure RFID Tags?" Proc. Workshop on RFID and Lightweight Crypto, Graz, pp. 13-15, July, 2005.
    • (2005) Proc. Workshop on RFID and Lightweight Crypto , pp. 13-15
    • Wolkerstorfer, J.1
  • 18
    • 85037166561 scopus 로고    scopus 로고
    • Privacy-preserving ECC-based grouping proofs for RFID
    • Springer Berlin Heidelberg
    • L. Batina, Y.-K. Lee, and S. Seys, D. Singelée and I. Verbauwhede, "Privacy-preserving ECC-based grouping proofs for RFID, " In: Information Security. Springer Berlin Heidelberg, pp. 159-165, 2011.
    • (2011) Information Security , pp. 159-165
    • Batina, L.1    Lee, Y.-K.2    Seys, S.3    Singelée, D.4    Verbauwhede, I.5
  • 19
    • 79953702872 scopus 로고    scopus 로고
    • Security Analysis of a Privacy-Preserving ECC-Based Grouping-Proof Protocol
    • C. Lv, H. Li, J. Ma, B. Niu and H. Jiang, "Security Analysis of a Privacy-Preserving ECC-Based Grouping-Proof Protocol, " Journal of Convergence Information Technology, Vol. 6, No. 3, pp. 113-119, 2011.
    • (2011) Journal of Convergence Information Technology , vol.6 , Issue.3 , pp. 113-119
    • Lv, C.1    Li, H.2    Ma, J.3    Niu, B.4    Jiang, H.5
  • 20
    • 84887302238 scopus 로고    scopus 로고
    • A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID
    • W. Ko, S. Chiou, E. Lu and H. Chang, "A Privacy-Preserving Grouping Proof Protocol Based on ECC with Untraceability for RFID, " Applied Mathematics, Vol. 3 No. 4, pp. 336-341, 2012.
    • (2012) Applied Mathematics , vol.3 , Issue.4 , pp. 336-341
    • Ko, W.1    Chiou, S.2    Lu, E.3    Chang, H.4
  • 23
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • N. Koblitz, "Elliptic Curve Cryptosystems, " Math. Comp., Vol. 48, No. 177, pp. 203-209, 1987.
    • (1987) Math. Comp. , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 24
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • LNCS 218, Springer-Verlag, Berlin
    • V. S. Miller, "Use of Elliptic Curves in Cryptography, " Proc. Cryptology-CRYPTO'85, LNCS 218, Springer-Verlag, Berlin, pp: 417-426, 1986.
    • (1986) Proc. Cryptology-CRYPTO'85 , pp. 417-426
    • Miller, V.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.