메뉴 건너뛰기




Volumn , Issue , 2011, Pages 128-132

RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; MEDICAL APPLICATIONS; MOBILE DEVICES; MOBILE SECURITY; NUMBER THEORY; RADIO SYSTEMS; RANDOM NUMBER GENERATION;

EID: 84949926397     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SOFTCOM.2014.7039120     Document Type: Conference Paper
Times cited : (3)

References (18)
  • 5
    • 67650664414 scopus 로고    scopus 로고
    • Department of Computer Science University of Oxford. [Online]. Available
    • C. Cremers. The scyther tool. Department of Computer Science, University of Oxford. [Online]. Available: http://users.ox.ac.uk/-coml0529/scyther/
    • The Scyther Tool
    • Cremers, C.1
  • 6
    • 0022716288 scopus 로고
    • A simple unpredictable pseudorandom number generator
    • L. Blum, M. Blum, and M. Shub, "A simple unpredictable pseudorandom number generator, " SIAM Journal on computing, vol. 15, no. 2, pp. 364-383, 1986.
    • (1986) SIAM Journal on Computing , vol.15 , Issue.2 , pp. 364-383
    • Blum, L.1    Blum, M.2    Shub, M.3
  • 16
    • 33750934217 scopus 로고    scopus 로고
    • Master's thesis, Technische Universiteit Eindhoven [Online]. Available
    • G. Hollestelle, "Systematic analysis of attacks on security protocols, " Master's thesis, Technische Universiteit Eindhoven, 2005. [Online]. Available: http://alexandria.tue.nl/extra1/afstversl/wsk-i/hollestelle2005. pdf
    • (2005) Systematic Analysis of Attacks on Security Protocols
    • Hollestelle, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.