메뉴 건너뛰기




Volumn , Issue , 2013, Pages

A SHA-3 based RFID mutual authentication protocol and its implementation

Author keywords

Hash function; Keccak; Mutual auth entication; RFID

Indexed keywords

KECCAK; LOW-COST RFID TAGS; MUTUAL AUTH ENTICATION; RESOURCE CONSUMPTION; RFID AUTHENTICATION; RFID MUTUAL AUTHENTICATION PROTOCOLS; SECURITY AND PRIVACY; SHA-3 COMPETITIONS;

EID: 84892523539     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSPCC.2013.6663868     Document Type: Conference Paper
Times cited : (7)

References (17)
  • 3
    • 70449375222 scopus 로고    scopus 로고
    • A security RFID authentication protocol based on hash function
    • Ternopil
    • T. Yu, Q. Feng, A Security RFID Authentication Protocol Based on Hash Function, in Information Engineering and Electronic Commerce, Ternopil, 2009, pp. 804-807.
    • (2009) Information Engineering and Electronic Commerce , pp. 804-807
    • Yu, T.1    Feng, Q.2
  • 4
    • 84903827490 scopus 로고    scopus 로고
    • On the security of mutual authentication protocols for RFID systems: The case of wei et al's protocol
    • M. Safkhani et al., On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al's Protocol, LNCS, vol 7122, pp. 90-103, 2011.
    • (2011) LNCS , vol.7122 , pp. 90-103
    • Safkhani, M.1
  • 6
    • 83755168979 scopus 로고    scopus 로고
    • RFID mutual authentication protocols using key exchange based on hash functions
    • Dec
    • Seung-Jae Jang et al.,. RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions. Communications in Computer and Information Science, vol 261, pp. 246-255, Dec. 2011.
    • (2011) Communications in Computer and Information Science , vol.261 , pp. 246-255
    • Jang, S.-J.1
  • 7
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • Mar
    • Jung-Sik Cho et al., Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications, vol 34, no 3, pp. 391-397, Mar. 2011.
    • (2011) Computer Communications , vol.34 , Issue.3 , pp. 391-397
    • Cho, J.-S.1
  • 8
    • 84855354856 scopus 로고    scopus 로고
    • (Jan 14). (3rd ed.)[Online]
    • G. Bertoni et al.(2011, Jan 14). The Keccak reference(3rd ed.)[Online]. Available: http://keccak.noekeon.org
    • (2011) The Keccak Reference
    • Bertoni, G.1
  • 10
    • 80155212157 scopus 로고    scopus 로고
    • Mutual authentication protocol based on hash function of RFID systems
    • Guilin
    • Lei-an Liu et al., Mutual Authentication Protocol Based on Hash Function of RFID Systems, in International Conference on Machine Learning and Cybernetics, Guilin, 2011, pp. 501-506.
    • (2011) International Conference on Machine Learning and Cybernetics , pp. 501-506
    • Liu, L.-A.1
  • 11
    • 79953083437 scopus 로고    scopus 로고
    • A mutual authentication protocol for RFID
    • Chia-Hui Wei et al., A Mutual Authentication Protocol for RFID, IT Professional, vol 13, no 2, pp. 20-24, 2011.
    • (2011) IT Professional , vol.13 , Issue.2 , pp. 20-24
    • Wei, C.-H.1
  • 12
    • 78650114205 scopus 로고    scopus 로고
    • A lightweight implementation of keccak hash function for radio-frequency identification applications
    • E. B. Kavun, T. Yalcin, A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications, LNCS, vol 6370, pp. 258-269, 2010.
    • (2010) LNCS , vol.6370 , pp. 258-269
    • Kavun, E.B.1    Yalcin, T.2
  • 16
    • 24944575863 scopus 로고    scopus 로고
    • Cryptographic approach to privacy-friendly tags
    • (MIT, Cambridge, MA, Nov. 15)
    • OHKUB M, SUZUKI K, KINOSHITA S. Cryptographic Approach to Privacy-Friendly Tags. Presented at the RFID Privacy Workshop (MIT, Cambridge, MA, Nov. 15 2003); rfidprivacy.ex.com/2003/agenda.php.
    • (2003) Presented at the RFID Privacy Workshop
    • Ohkub, M.1    Suzuki, K.2    Kinoshita, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.