메뉴 건너뛰기




Volumn 17, Issue 4, 2015, Pages 413-422

Improved RFID authentication protocol based on randomized McEliece cryptosystem

Author keywords

Authentication protocol; McEliece cryptosystem; RFID

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; EMBEDDED SYSTEMS; MICROPROCESSOR CHIPS; MOBILE SECURITY; QUANTUM COMPUTERS;

EID: 84935453827     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (35)
  • 1
    • 26444497860 scopus 로고    scopus 로고
    • The AVISPA tool for the automated validation of internet security protocols and applications
    • K. Etessami and S. Rajamani, eds
    • A. Armando, et al., "The AVISPA tool for the automated validation of internet security protocols and applications," in Proceedings of 17th International Conference on Computer Aided Verification (K. Etessami and S. Rajamani, eds.), vol. 3576, pp. 281-285, 2005.
    • (2005) Proceedings of 17th International Conference on Computer Aided Verification , vol.3576 , pp. 281-285
    • Armando, A.1
  • 2
    • 84874466469 scopus 로고    scopus 로고
    • HLPSL tutorial the Beginner's guide to modelling and analysing internet security protocols
    • Technical Report, AVISPA project
    • The AVISPA Team, "HLPSL tutorial the Beginner's guide to modelling and analysing internet security protocols," Technical Report, AVISPA project, 2006.
    • (2006)
  • 5
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International Journal of Network Security, vol. 9, pp. 95-100, 2009.
    • (2009) International Journal of Network Security , vol.9 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 6
    • 85103361301 scopus 로고    scopus 로고
    • Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes
    • LNCS 7293
    • P. L. Cayrel, G. Hoffmann, and E. Persichetti, "Efficient implementation of a CCA2-secure variant of McEliece using generalized Srivastava codes," in Proceedings of PKC'2012, LNCS 7293, pp. 138-155, 2012.
    • (2012) Proceedings of PKC'2012 , pp. 138-155
    • Cayrel, P.L.1    Hoffmann, G.2    Persichetti, E.3
  • 7
    • 79953072900 scopus 로고    scopus 로고
    • RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards
    • C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, "RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards," International Journal of Network Security, vol. 13, pp. 41-48, 2011.
    • (2011) International Journal of Network Security , vol.13 , pp. 41-48
    • Chen, C.L.1    Lai, Y.L.2    Chen, C.C.3    Deng, Y.Y.4    Hwang, Y.C.5
  • 9
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for lowcost RFID
    • H. Y. Chien and C. S. Laih, "ECC-based lightweight authentication protocol with untraceability for lowcost RFID," Journal of Parallel and Distributed Computing, vol. 69, pp. 848-853, 2009.
    • (2009) Journal of Parallel and Distributed Computing , vol.69 , pp. 848-853
    • Chien, H.Y.1    Laih, C.S.2
  • 17
    • 84903879790 scopus 로고    scopus 로고
    • On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags
    • W. Khedr, "On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags," International Journal of Network Security, vol. 16, no. 5, pp. 369-375, 2014.
    • (2014) International Journal of Network Security , vol.16 , Issue.5 , pp. 369-375
    • Khedr, W.1
  • 18
    • 44449145213 scopus 로고    scopus 로고
    • Personalized-public-key cryptosystem (P2KC) Application where publickey size of Niederreiter PKC can be reduced
    • K. Kobara and H. Imai, "Personalized-public-key cryptosystem (P2KC) Application where publickey size of Niederreiter PKC can be reduced," in Workshop on Codes and Lattices in Cryptography (CLC'06), pp. 61-68, 2006.
    • (2006) Workshop on Codes and Lattices in Cryptography (CLC'06) , pp. 61-68
    • Kobara, K.1    Imai, H.2
  • 20
    • 0003777826 scopus 로고
    • A public-key system based on algebraic coding theory
    • Technical Report
    • R. J. McEliece, "A public-key system based on algebraic coding theory," Technical Report, DSN Progress Report 44, Jet Propulsion Lab, 1978.
    • (1978) Jet Propulsion Lab
    • McEliece, R.J.1
  • 21
    • 84935456608 scopus 로고    scopus 로고
    • The Mifar Cards, 2015. (http://www.mifare.net)
    • (2015) The Mifar Cards
  • 24
    • 51349142711 scopus 로고    scopus 로고
    • Semantic security for the McEliece cryptosystem without random oracles
    • R. Nojima, H. Imai, K. Kobara, and K. Morozov, "Semantic security for the McEliece cryptosystem without random oracles," Designs, Codes and Cryptography, vol. 49, no. 1-3, pp. 289-305, 2008.
    • (2008) Designs, Codes and Cryptography , vol.49 , Issue.1-3 , pp. 289-305
    • Nojima, R.1    Imai, H.2    Kobara, K.3    Morozov, K.4
  • 25
    • 41549161615 scopus 로고    scopus 로고
    • Privacy of recent RFID authentication protocols
    • L. Chen, Y. Mu, and W. Susilo, eds, LNCS 4991
    • K. Ouafi and R. C. W. Phan, "Privacy of recent RFID authentication protocols," in Proceedings of ISPEC'08 (L. Chen, Y. Mu, and W. Susilo, eds.), LNCS 4991, pp. 263-277, 2008.
    • (2008) Proceedings of ISPEC'08 , pp. 263-277
    • Ouafi, K.1    Phan, R.C.W.2
  • 26
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • C. S. Park, "Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems," Computer Networks, vol. 44, pp. 267-273, 2004.
    • (2004) Computer Networks , vol.44 , pp. 267-273
    • Park, C.S.1
  • 29
    • 70449478600 scopus 로고    scopus 로고
    • Encoding information into constant weight words
    • N. Sendrier, "Encoding information into constant weight words," in IEEE Conference on ISIT'05, pp. 435-438, 2005.
    • (2005) IEEE Conference on ISIT'05 , pp. 435-438
    • Sendrier, N.1
  • 31
    • 84884726168 scopus 로고    scopus 로고
    • Code based cryptography and steganography
    • LNCS 8080
    • P. Véron, "Code based cryptography and steganography," in Proceedings of CAI'13, LNCS 8080, pp. 9-46, 2013.
    • (2013) Proceedings of CAI'13 , pp. 9-46
    • Véron, P.1
  • 33
    • 79953083437 scopus 로고    scopus 로고
    • A mutual authentication protocol for RFID
    • C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "A mutual authentication protocol for RFID," IEEE IT Professional, vol. 13, no. 2, pp. 20-24, 2011.
    • (2011) IEEE IT Professional , vol.13 , Issue.2 , pp. 20-24
    • Wei, C.H.1    Hwang, M.S.2    Chin, A.Y.H.3
  • 34
    • 84866074525 scopus 로고    scopus 로고
    • An improved authentication protocol for mobile agent device in RFID
    • C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID," International Journal of Mobile Communications, vol. 10, no. 5, pp. 508-520, 2012.
    • (2012) International Journal of Mobile Communications , vol.10 , Issue.5 , pp. 508-520
    • Wei, C.H.1    Hwang, M.S.2    Chin, A.Y.H.3
  • 35


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.