-
2
-
-
79551648752
-
A lightweight stream cipher wg-7 for rfid encryption and authentication
-
Y. Luo, Q. Chai, G. Gong, and X. Lai, "A lightweight stream cipher wg-7 for rfid encryption and authentication, " in Global Telecommunications Conference (GLOBECOM 2010), IEEE, 2010, pp. 1-6.
-
(2010)
Global Telecommunications Conference (GLOBECOM 2010), IEEE
, pp. 1-6
-
-
Luo, Y.1
Chai, Q.2
Gong, G.3
Lai, X.4
-
3
-
-
84861656938
-
Rfid protocol based on random number and encryption hash
-
Q. Quan, G. Xiang, and Z. Rui, "Rfid protocol based on random number and encryption hash, " in Wireless Mobile and Computing (CCWMC 2011), IET International Communication Conference on, 2011, pp. 169-174.
-
(2011)
Wireless Mobile and Computing (CCWMC 2011), IET International Communication Conference on
, pp. 169-174
-
-
Quan, Q.1
Xiang, G.2
Rui, Z.3
-
5
-
-
67650664414
-
-
Department of Computer Science University of Oxford. [Online]. Available
-
C. Cremers. The scyther tool. Department of Computer Science, University of Oxford. [Online]. Available: http://users.ox.ac.uk/-coml0529/scyther/
-
The Scyther Tool
-
-
Cremers, C.1
-
6
-
-
0022716288
-
A simple unpredictable pseudorandom number generator
-
L. Blum, M. Blum, and M. Shub, "A simple unpredictable pseudorandom number generator, " SIAM Journal on computing, vol. 15, no. 2, pp. 364-383, 1986.
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
8
-
-
79951503316
-
Cryptographically secure pseudo-random bit generator for rfid tags
-
P. Peris-Lopez, E. San Millan, J. van der Lubbe, and L. Entrena, "Cryptographically secure pseudo-random bit generator for rfid tags, " in Internet Technology and Secured Transactions (ICITST), International Conference for, 2010, pp. 1-6.
-
(2010)
Internet Technology and Secured Transactions (ICITST), International Conference for
, pp. 1-6
-
-
Peris-Lopez, P.1
San Millan, E.2
Lubbe Der J.Van3
Entrena, L.4
-
9
-
-
80052776708
-
Akari-x: A pseudorandom number generator for secure lightweight systems
-
H. Martin, E. San Millan, L. Entrena, P. Lopez, and J. Castro, "Akari-x: A pseudorandom number generator for secure lightweight systems, " in On-Line Testing Symposium (IOLTS), IEEE 17th International, 2011, pp. 228-233.
-
(2011)
On-Line Testing Symposium (IOLTS) IEEE 17th International
, pp. 228-233
-
-
Martin, H.1
San Millan, E.2
Entrena, L.3
Lopez, P.4
Castro, J.5
-
10
-
-
84856529125
-
Multiplepolynomial lfsr based pseudorandom number generator for epc gen2 rfid tags
-
J. Melia-Segui, J. Garcia-Alfaro, and J. Herrera-Joancomarti, "Multiplepolynomial lfsr based pseudorandom number generator for epc gen2 rfid tags, " in IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, 2011, pp. 3820-3825.
-
(2011)
IECon 2011-37th Annual Conference on IEEE Industrial Electronics Society
, pp. 3820-3825
-
-
Melia-Segui, J.1
Garcia-Alfaro, J.2
Herrera-Joancomarti, J.3
-
11
-
-
78249288809
-
Puf-based encryption processor for the rfid systems
-
W. Choi, S. Kim, Y. Kim, Y. Park, and K. Ahn, "Puf-based encryption processor for the rfid systems, " in Computer and Information Technology (CIT), IEEE 10th International Conference on, 2010, pp. 2323-2328.
-
(2010)
Computer and Information Technology (CIT), IEEE 10th International Conference on
, pp. 2323-2328
-
-
Choi, W.1
Kim, S.2
Kim, Y.3
Park, Y.4
Ahn, K.5
-
12
-
-
80052354575
-
A novel stream cipher with hash function for the rfid device
-
S.-S. Shen, H.-R. Liao, S.-H. Lin, and J.-H. Chiu, "A novel stream cipher with hash function for the rfid device, " in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fifth International Conference on, 2011, pp. 532-536.
-
(2011)
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Fifth International Conference on
, pp. 532-536
-
-
Shen, S.-S.1
Liao, H.-R.2
Lin, S.-H.3
Chiu, J.-H.4
-
13
-
-
84890056133
-
A novel authenticated encryption algorithm for rfid systems
-
Z. Jeddi, E. Amini, and M. Bayoumi, "A novel authenticated encryption algorithm for rfid systems, " in Digital System Design (DSD), Euromicro Conference on, 2013, pp. 658-661.
-
(2013)
Digital System Design (DSD), Euromicro Conference on
, pp. 658-661
-
-
Jeddi, Z.1
Amini, E.2
Bayoumi, M.3
-
16
-
-
33750934217
-
-
Master's thesis, Technische Universiteit Eindhoven [Online]. Available
-
G. Hollestelle, "Systematic analysis of attacks on security protocols, " Master's thesis, Technische Universiteit Eindhoven, 2005. [Online]. Available: http://alexandria.tue.nl/extra1/afstversl/wsk-i/hollestelle2005. pdf
-
(2005)
Systematic Analysis of Attacks on Security Protocols
-
-
Hollestelle, G.1
|