메뉴 건너뛰기




Volumn 11, Issue , 2013, Pages 45-56

IBIHOP: Proper privacy preserving mutual RFID authentication

Author keywords

[No Author keywords available]

Indexed keywords

RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 84888102154     PISSN: 18716431     EISSN: 18798101     Source Type: Book Series    
DOI: 10.3233/978-1-61499-328-5-45     Document Type: Article
Times cited : (8)

References (20)
  • 3
    • 84937408891 scopus 로고    scopus 로고
    • GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
    • Springer
    • M. Bellare and A. Palacio. GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks. In CRYPTO '02, volume 2442 of LNCS, pages 162-177. Springer, 2002
    • (2002) CRYPTO '02 Volume 2442 of LNCS , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 6
    • 70350639755 scopus 로고    scopus 로고
    • Ecc is ready for rfid-a proof in silicon
    • R. Avanzi, L. Keliher, and F. Si, editors of LNCS Springer
    • D. Hein, J. Wolkerstorfer, and N. Felber. ECC Is Ready for RFID-A Proof in Silicon. In R. Avanzi, L. Keliher, and F. Si, editors, Selected Areas in Cryptography-SAC '08, volume 5381 of LNCS, pages 401-413. Springer, 2008
    • (2008) Selected Areas in Cryptography-SAC '08 , vol.5381 , pp. 401-413
    • Hein, D.1    Wolkerstorfer, J.2    Felber, N.3
  • 8
    • 79960084103 scopus 로고    scopus 로고
    • Memory-constrained implementations of elliptic curve cryptography in co-z coordinate representation
    • Springer
    • M. Hutter, M. Joye, and Y. Sierra. Memory-constrained implementations of elliptic curve cryptography in co-z coordinate representation. In AFRICACRYPT '11, volume 6737 of LNCS, pages 170-187. Springer, 2011
    • (2011) AFRICACRYPT '11 Volume 6737 of LNCS , pp. 170-187
    • Hutter, M.1    Joye, M.2    Sierra, Y.3
  • 10
    • 79958073961 scopus 로고    scopus 로고
    • New methods for cost-effective side-channel attacks on cryptographic rfids
    • T. Kasper, D. Oswald, and C. Paar. New Methods for Cost-Effective Side-Channel Attacks on Cryptographic RFIDs. In RFIDSec'09, 15 pages. 2009
    • (2009) RFIDSec'09 , pp. 15
    • Kasper, T.1    Oswald, D.2    Paar, C.3
  • 12
    • 84947913604 scopus 로고    scopus 로고
    • Fast multiplication on elliptic curves over gf(2m) without precomputation
    • Springer
    • J. López and R. Dahab. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation. In CHES'99, volume 1717 of LNCS, pages 316-327. Springer, 1999
    • (1999) CHES'99 Volume 1717 of LNCS , pp. 316-327
    • López, J.1    Dahab, R.2
  • 14
    • 67650132302 scopus 로고    scopus 로고
    • Low-cost sha-1 hash function architecture for rfid tags
    • M. O'Neill. Low-Cost SHA-1 Hash Function Architecture for RFID Tags. In RFIDSec' 08, pages 41-51, 2008
    • (2008) RFIDSec , vol.8 , pp. 41-451
    • O'Neill, M.1
  • 15
    • 70349118926 scopus 로고    scopus 로고
    • Mutual authentication in rfid: Security and privacy
    • ACM Press
    • R-I. Paise and S. Vaudenay. Mutual Authentication in RFID: Security and Privacy. In ASIACCS'08, pages 292-299. ACM Press, 2008
    • (2008) ASIACCS'08 , pp. 292-299
    • Paise, R.-I.1    Vaudenay, S.2
  • 17
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • C-P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161-174, 1991
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-1174
    • Schnorr, C.-P.1
  • 20
    • 78650174351 scopus 로고    scopus 로고
    • Secure and private search protocols for rfid systems
    • Y. Zuo. Secure and Private Search Protocols for RFID Systems. Information Systems Frontiers, 12(5):507-519, 2010
    • (2010) Information Systems Frontiers , vol.12 , Issue.5 , pp. 507-519
    • Zuo, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.