-
1
-
-
78650590814
-
Impossibility results for rfid privacy notions
-
Springer
-
F. Armknecht, A-R. Sadeghi, A. Scafuro, I. Visconti, and C. Wachsmann. Impossibility Results for RFID Privacy Notions. In Transactions on Computational Science XI, volume 6480 of LNCS, pages 39-63. Springer, 2010
-
(2010)
Transactions on Computational Science XI Volume 6480 of LNCS
, pp. 39-63
-
-
Armknecht, F.1
Sadeghi, A.-R.2
Scafuro, A.3
Visconti, I.4
Wachsmann, C.5
-
2
-
-
78650151843
-
On rfid privacy with mutual authentication and tag corruption
-
Springer
-
F. Armknecht, A-R. Sadeghi, I. Visconti, and C. Wachsmann. On RFID Privacy with Mutual Authentication and Tag Corruption. In ACNS '10, volume 6123 of LNCS, pages 493-510. Springer, 2010
-
(2010)
ACNS '10 Volume 6123 of LNCS
, pp. 493-510
-
-
Armknecht, F.1
Sadeghi, A.-R.2
Visconti, I.3
Wachsmann, C.4
-
3
-
-
84937408891
-
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
-
Springer
-
M. Bellare and A. Palacio. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In CRYPTO '02, volume 2442 of LNCS, pages 162-177. Springer, 2002
-
(2002)
CRYPTO '02 Volume 2442 of LNCS
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
4
-
-
77649268686
-
Private Interrogation of Devices via Identification Codes
-
Springer
-
J. Bringer, H. Chabanne, G. D. Cohen, and B. Kindarji. Private Interrogation of Devices via Identification Codes. In INDOCRYPT '09, volume 5922 of LNCS, pages 272-289. Springer, 2009
-
(2009)
INDOCRYPT '09 Volume 5922 of LNCS
, pp. 272-289
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.D.3
Kindarji, B.4
-
5
-
-
58449108568
-
Cryptanalysis of EC-RAC, a RFID Identification Protocol
-
Springer
-
J. Bringer, H. Chabanne, and T. Icart. Cryptanalysis of EC-RAC, a RFID Identification Protocol. In International Conference on Cryptology and Network Security-CANS 2008, volume 5339 of LNCS, pages 149-161. Springer, 2008
-
International Conference on Cryptology and Network Security-CANS 2008 5339 of LNCS
, Issue.2008
, pp. 149-161
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
6
-
-
70350639755
-
Ecc is ready for rfid-a proof in silicon
-
R. Avanzi, L. Keliher, and F. Si, editors of LNCS Springer
-
D. Hein, J. Wolkerstorfer, and N. Felber. ECC Is Ready for RFID-A Proof in Silicon. In R. Avanzi, L. Keliher, and F. Si, editors, Selected Areas in Cryptography-SAC '08, volume 5381 of LNCS, pages 401-413. Springer, 2008
-
(2008)
Selected Areas in Cryptography-SAC '08
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
7
-
-
80052972135
-
A new rfid privacy model
-
Springer
-
J. Hermans, A. Pashalidis, F. Vercauteren, and B. Preneel. A New RFID Privacy Model. In ESORICS 2011, volume 6879 of LNCS, pages 568-587. Springer, 2011
-
(2011)
ESORICS 2011 Volume 6879 of LNCS
, pp. 568-587
-
-
Hermans, J.1
Pashalidis, A.2
Vercauteren, F.3
Preneel, B.4
-
8
-
-
79960084103
-
Memory-constrained implementations of elliptic curve cryptography in co-z coordinate representation
-
Springer
-
M. Hutter, M. Joye, and Y. Sierra. Memory-constrained implementations of elliptic curve cryptography in co-z coordinate representation. In AFRICACRYPT '11, volume 6737 of LNCS, pages 170-187. Springer, 2011
-
(2011)
AFRICACRYPT '11 Volume 6737 of LNCS
, pp. 170-187
-
-
Hutter, M.1
Joye, M.2
Sierra, Y.3
-
10
-
-
79958073961
-
New methods for cost-effective side-channel attacks on cryptographic rfids
-
T. Kasper, D. Oswald, and C. Paar. New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs. In RFIDSec'09, 15 pages. 2009
-
(2009)
RFIDSec'09
, pp. 15
-
-
Kasper, T.1
Oswald, D.2
Paar, C.3
-
11
-
-
54049143316
-
Elliptic curve based security processor for rfid
-
Y. K. Lee, L. Batina, K. Sakiyama, and I. Verbauwhede. Elliptic Curve Based Security Processor for RFID. IEEE Transactions on Computers, 57(11):1514-1527, 2008
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1514-11527
-
-
Lee, Y.K.1
Batina, L.2
Sakiyama, K.3
Verbauwhede, I.4
-
12
-
-
84947913604
-
Fast multiplication on elliptic curves over gf(2m) without precomputation
-
Springer
-
J. López and R. Dahab. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. In CHES'99, volume 1717 of LNCS, pages 316-327. Springer, 1999
-
(1999)
CHES'99 Volume 1717 of LNCS
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
14
-
-
67650132302
-
Low-cost sha-1 hash function architecture for rfid tags
-
M. O'Neill. Low-Cost SHA-1 Hash Function Architecture for RFID Tags. In RFIDSec' 08, pages 41-51, 2008
-
(2008)
RFIDSec
, vol.8
, pp. 41-451
-
-
O'Neill, M.1
-
15
-
-
70349118926
-
Mutual authentication in rfid: Security and privacy
-
ACM Press
-
R-I. Paise and S. Vaudenay. Mutual Authentication in RFID: Security and Privacy. In ASIACCS'08, pages 292-299. ACM Press, 2008
-
(2008)
ASIACCS'08
, pp. 292-299
-
-
Paise, R.-I.1
Vaudenay, S.2
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
C-P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161-174, 1991
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-1174
-
-
Schnorr, C.-P.1
-
19
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Springer
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In Security in Pervasive Computing' 03, volume 2802 of LNCS, pages 201-212. Springer, 2003
-
(2003)
Security in Pervasive Computing' 03 Volume 2802 of LNCS
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
20
-
-
78650174351
-
Secure and private search protocols for rfid systems
-
Y. Zuo. Secure and Private Search Protocols for RFID Systems. Information Systems Frontiers, 12(5):507-519, 2010
-
(2010)
Information Systems Frontiers
, vol.12
, Issue.5
, pp. 507-519
-
-
Zuo, Y.1
|