-
2
-
-
33744957484
-
Adversarial Model for Radio Frequency Identification
-
Report 2005/049
-
G. Avoine, Adversarial Model for Radio Frequency Identification. Cryptology ePrint Archive, Report 2005/049, 2005. http://eprint.iacr.org/
-
(2005)
Cryptology Eprint Archive
-
-
Avoine, G.1
-
3
-
-
26444443915
-
-
(IEEE Computer Society, Washington, DC, 2005)
-
G. Avoine, P. Oechslin, in A Scalable and Provably Secure Hash-Based RFID Protocol. Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW ’05) (IEEE Computer Society, Washington, DC, 2005)
-
A Scalable and Provably Secure Hash-Based RFID Protocol. Proceedings of the 3Rd IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW ’05)
-
-
Avoine, G.1
Oechslin, P.2
-
4
-
-
84937408891
-
GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks
-
Springer, Berlin
-
M. Bellare, A. Palacio, GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacks. in Advances in Cryptology - CRYPTO’02. Lecture Notes in Computer Science, vol. 2442 (Springer, Berlin, 2002), pp. 162-177
-
(2002)
Advances in Cryptology - CRYPTO’02. Lecture Notes in Computer Science
, vol.2442
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
5
-
-
74049109627
-
-
ACM, New York, NY
-
C. Berbain, O. Billet, J. Etrog, H. Gilbert, in An Efficient Forward Private RFID Protocol. CCS ’09: Proceedings of the 16th ACM conference on Computer and Communications Security (ACM, New York, NY, 2009), pp. 43-53
-
(2009)
In an Efficient Forward Private RFID Protocol. CCS ’09: Proceedings of the 16Th ACM Conference on Computer and Communications Security
, pp. 43-53
-
-
Berbain, C.1
Billet, O.2
Etrog, J.3
Gilbert, H.4
-
6
-
-
84976295016
-
Distance-bounding protocols
-
Springer, Berlin, Heidelberg
-
S. Brands, D. Chaum, Distance-bounding protocols. in Advances in Cryptology - EUROCRYPT ’93. Lecture Notes in Computer Science, vol. 765 (Springer, Berlin, Heidelberg, 1994), pp. 344-359
-
(1994)
Advances in Cryptology - EUROCRYPT ’93. Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
7
-
-
51349120734
-
Trusted-HB: A low-cost version of HB+ secure against man-in-themiddle attacks
-
J. Bringer, H. Chabanne, Trusted-HB: A low-cost version of HB+ secure against man-in-themiddle attacks. IEEE Trans. Inf. Theory 54(9), 4339-4342 (2008)
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4339-4342
-
-
Bringer, J.1
Chabanne, H.2
-
8
-
-
33845920117
-
-
IEEE Computer Society, Washington, DC
-
++: A Lightweight Authentication Protocol Secure Against Some Attacks. Security, Privacy and Trust in Pervasive and Ubiquitous Computing -SecPerU (IEEE Computer Society, Washington, DC, 2006)
-
(2006)
HB: A Lightweight Authentication Protocol Secure against Some Attacks. Security, Privacy and Trust in Pervasive and Ubiquitous Computing -Secperu
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
9
-
-
85019756886
-
-
Lecture Notes in Computer Science, Springer, Heidelberg
-
J. Bringer, H. Chabanne, T. Icart, in Cryptanalysis of EC-RAC, a RFID Identification Protocol. International Conference on Cryptology and Network Security - CANS’08. Lecture Notes in Computer Science (Springer, Heidelberg, 2008)
-
(2008)
Cryptanalysis of EC-RAC, a RFID Identification Protocol. International Conference on Cryptology and Network Security - CANS’08
-
-
Bringer, J.1
Chabanne, H.2
Icart, T.3
-
10
-
-
74049103852
-
-
USENIX, Montreal
-
B. Danev, T.S. Heydt-Benjamin, S. Cˇ apkun, in Physical-Layer Identification of RFID Devices. Proceedings of the 18th USENIX Security Symposium (USENIX Security ’09) (USENIX, Montreal, 2009), pp. 125-136
-
(2009)
In Physical-Layer Identification of RFID Devices. Proceedings of the 18Th USENIX Security Symposium (USENIX Security ’09)
, pp. 125-136
-
-
Danev, B.1
Heydt-Benjamin, T.S.2
Apkun, S.C.3
-
12
-
-
77952353685
-
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC
-
T. Deursen, S. Radomirović, Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC, in Cryptology ePrint Archive: Report 2009/332, 2009
-
(2009)
Cryptology Eprint Archive: Report 2009/332
-
-
Deursen, T.1
Radomirović, S.2
-
13
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P.C. Van-Oorschot, M.J. Weiner, Authentication and authenticated key exchanges. Designs, Codes Cryptogr. 2(2), 107-125 (1992)
-
(1992)
Designs, Codes Cryptogr
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van-Oorschot, P.C.2
Weiner, M.J.3
-
16
-
-
35048859848
-
In Strong Authentication for RFID Systems using the AES Algorithm
-
ed. by M. Joye, J.J, Lecture Notes in Computer Science, Springer, Heidelberg
-
M. Feldhofer, S. Dominikus, J. Wolkerstorfer, in Strong Authentication for RFID Systems using the AES Algorithm. ed. by M. Joye, J.J. Quisquater. Cryptographic Hardware and Embedded Systems - CHES’04. Lecture Notes in Computer Science, vol. 3156 (Springer, Heidelberg, 2004), pp. 357-370
-
(2004)
Quisquater. Cryptographic Hardware and Embedded Systems - CHES’04
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
18
-
-
27644472569
-
An active attack against HB+ - a provably secure lightweight authentication protocol
-
H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+ - a provably secure lightweight authentication protocol. IEE Process. Lett. 41(21), 1169-1170 (2005)
-
(2005)
IEE Process. Lett
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
19
-
-
45749153036
-
-
ed. by S. Bellovin, R. Gennaro, ACNS 2008. Lecture Notes in Computer Science, Springer, Heidelberg
-
G. Hammouri, B. Sunar, in PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. ed. by S. Bellovin, R. Gennaro. Applied Cryptography and Network Security: 6th International Conference, ACNS 2008. Lecture Notes in Computer Science, vol. 5037 (Springer, Heidelberg, 2008)
-
(2008)
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
, vol.5037
-
-
Hammouri, G.1
Sunar, B.2
-
20
-
-
33847329743
-
-
IEEE Computer Society, Washington, DC
-
G.P. Hancke, M.G. Kuhn, in An RFID Distance Bounding Protocol. Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM ’05) (IEEE Computer Society, Washington, DC, 2005), pp. 67-73.
-
(2005)
In an RFID Distance Bounding Protocol. Proceedings of the 1St International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM ’05)
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
21
-
-
70350639755
-
ECC Is Ready for RFID - A Proof in Silicon
-
Lecture Notes in Computer Science, Springer, Heidelberg
-
D. Hein, J. Wolkerstorfer, N. Felber, in ECC Is Ready for RFID - A Proof in Silicon. Selected Areas in Cryptography. Lecture Notes in Computer Science, vol. 5381 (Springer, Heidelberg, 2009), pp. 401-413.
-
(2009)
Selected Areas in Cryptography
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
22
-
-
2942625823
-
In Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers
-
IEEE Computer Society, Washington, DC
-
D. Henrici, P. Müller, in Hash-Based Enhancement of Location Privacy for Radio-Frequency Identification Devices Using Varying Identifiers. Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW ’04) (IEEE Computer Society, Washington, DC, 2004), pp. 149-153
-
(2004)
Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW ’04)
, pp. 149-153
-
-
Henrici, D.1
Müller, P.2
-
23
-
-
70349284581
-
In Secure Human Identification Protocols
-
Springer-Verlag, Berlin, Heidelberg, New York, NY
-
N.J. Hopper, M. Blum, in Secure Human Identification Protocols. ASIACRYPT ’01: Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2001), pp. 52-66
-
(2001)
ASIACRYPT ’01: Proceedings of the 7Th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 52-66
-
-
Hopper, N.J.1
Blum, M.2
-
25
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels, RFID security and privacy: A research survey. IEEE J. Sel. Areas Commun. 24(2), 381-394 (2006)
-
(2006)
IEEE J. Sel. Areas Commun
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
26
-
-
33745181952
-
Authenticating Pervasive Devices with Human Protocols
-
Lecture Notes in Computer Science, IACR, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
A. Juels, S.A. Weis, in Authenticating Pervasive Devices with Human Protocols. Proceedings of CRYPTO’05. Lecture Notes in Computer Science, vol. 3126 (IACR, Springer-Verlag, Berlin, Heidelberg, New York, NY, 2005), pp. 293-308
-
(2005)
Proceedings of CRYPTO’05
, vol.3126
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
28
-
-
84943632039
-
In Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other systems
-
N. Koblitz, editor, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
P. Kocher, in Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS and Other systems. In N. Koblitz, editor, Advances in Cryptology: Proceedings of CRYPTO’96, number 1109 in Lecture Notes in Computer Science, pages 104-113. Springer-Verlag, Berlin, Heidelberg, New York, NY, 1996.
-
(1996)
Advances in Cryptology: Proceedings of CRYPTO’96, Number 1109 in Lecture Notes in Computer Science
, pp. 104-113
-
-
Kocher, P.1
-
29
-
-
84939573910
-
In Differential Power Analysis
-
ed. by M. Wiener, Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
P. Kocher, J. Jaffe, B. Jun, in Differential Power Analysis. ed. by M. Wiener. Advances in Cryptology: Proceedings of CRYPTO’99. Lecture Notes in Computer Science, vol. 1666, (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1999), pp. 388-397
-
(1999)
Advances in Cryptology: Proceedings of CRYPTO’99
, vol.1666
, pp. 388-397
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
30
-
-
77952337733
-
In Low-Cost Untraceable Authentication Protocols for RFID
-
ACM, New York, NY, USA
-
Y.K. Lee, L. Batina, D. Singelee, I. Verbauwhede, in Low-Cost Untraceable Authentication Protocols for RFID. ACM Conference on Wireless Network Security - WiSec ’10 (ACM, New York, NY, USA, 2010), pp. 55-64
-
(2010)
ACM Conference on Wireless Network Security - Wisec ’10
, pp. 55-64
-
-
Lee, Y.K.1
Batina, L.2
Singelee, D.3
Verbauwhede, I.4
-
31
-
-
49049105964
-
In EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol
-
IEEE
-
Y.K. Lee, L. Batina, I. Verbauwhede, in EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID Authentication Protocol. IEEE International Conference on RFID (IEEE, 2008), pp. 97-104
-
(2008)
IEEE International Conference on RFID
, pp. 97-104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
33
-
-
54049143316
-
Elliptic curve based security processor for RFID
-
Y.K. Lee, K. Sakiyama, L. Batina, I. Verbauwhede, Elliptic curve based security processor for RFID. IEEE Trans. Comput. 57(11), 1514-1527 (Nov 2008)
-
(2008)
IEEE Trans. Comput
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
34
-
-
41549156956
-
In A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
J. Lim, H. Oh, S. Kim, in A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. Proceedings of the 4th International Conference on InformationSecurity Practice and Experience (ISPEC ’08). Lecture Notes in Computer Science, vol. 4991 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2008), pp. 278-289
-
(2008)
Proceedings of the 4Th International Conference on Informationsecurity Practice and Experience (ISPEC ’08)
, vol.4991
, pp. 278-289
-
-
Lim, J.1
Oh, H.2
Kim, S.3
-
35
-
-
33745597876
-
In A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
D. Molnar, A. Soppera, D. Wagner, in A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags. Proceedings of the 12th Annual International Workshop of Selected Areas in Cryptography (SAC ’05). Lecture Notes in Computer Science, vol. 3897 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2005), pp. 276-290.
-
(2005)
Proceedings of the 12Th Annual International Workshop of Selected Areas in Cryptography (SAC ’05)
, vol.3897
, pp. 276-290
-
-
Molnar, D.1
Soppera, A.2
Wagner, D.3
-
36
-
-
57049184162
-
RFID Privacy Models Revisited
-
Lecture Notes in Computer Science,, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
C.Y. Ng, W. Susilo, Y. Mu, R. Safavi-Naini, in RFID Privacy Models Revisited. European Symposium on Research in Computer Security (ESORICS’08). Lecture Notes in Computer Science, vol. 5283 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2008), pp. 251-266
-
(2008)
European Symposium on Research in Computer Security (ESORICS’08)
, vol.5283
, pp. 251-266
-
-
Ng, C.Y.1
Susilo, W.2
Mu, Y.3
Safavi-Naini, R.4
-
37
-
-
84855359000
-
-
NIST National Institute of Standards and Technology. Cryptographic Hash Algorithm Competition. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html.
-
Cryptographic Hash Algorithm Competition
-
-
-
38
-
-
25444432606
-
RFID privacy issues and technical challenges
-
M. Ohkubo, K. Suzuki, S. Kinoshita, RFID privacy issues and technical challenges. Commun. ACM 48(9), 66-71 (2005)
-
(2005)
Commun. ACM
, vol.48
, Issue.9
, pp. 66-71
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
39
-
-
84875762817
-
-
Advances in Cryptology - CRYPTO’92, ed. by E.F. Brickell. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
T. Okamoto, Provably secure and practical identification schemes and corresponding signature schemes. Advances in Cryptology - CRYPTO’92, ed. by E.F. Brickell. Lecture Notes in Computer Science, vol. 740 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1992), pp. 31-53
-
(1992)
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
, vol.740
, pp. 31-53
-
-
Okamoto, T.1
-
40
-
-
30344466340
-
Security standards for the RFID market
-
T. Phillips, T. Karygiannis, R. Kuhn, Security standards for the RFID market. Secur. Priv. 3(6), 85-89 (2005)
-
(2005)
Secur. Priv
, vol.3
, Issue.6
, pp. 85-89
-
-
Phillips, T.1
Karygiannis, T.2
Kuhn, R.3
-
41
-
-
49249101824
-
Second-generation RFID
-
A. Razaq, W. Luk, K. Shum, L. Cheng, K. Yung, Second-generation RFID. Secur. Priv. 6(4), 21-27 (2008)
-
(2008)
Secur. Priv
, vol.6
, Issue.4
, pp. 21-27
-
-
Razaq, A.1
Luk, W.2
Shum, K.3
Cheng, L.4
Yung, K.5
-
42
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
ed. by G. Brassard. Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
C.-P. Schnorr, Efficient identification and signatures for smart cards. Advances in Cryptology - CRYPTO’89, ed. by G. Brassard. Lecture Notes in Computer Science, vol. 435 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 1989), pp. 239-252
-
(1989)
Advances in Cryptology - CRYPTO’89
, vol.435
, pp. 239-252
-
-
Schnorr, C.-P.1
-
43
-
-
38149028509
-
Distance Bounding in Noisy Environments
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
D. Singelée, B. Preneel, Distance Bounding in Noisy Environments. Proceedings of the 4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS ’07). Lecture Notes in Computer Science, vol. 4572 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2007), pp. 101-115
-
(2007)
Proceedings of the 4Th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS ’07)
, vol.4572
, pp. 101-115
-
-
Singelée, D.1
Preneel, B.2
-
44
-
-
56749103027
-
In RFID Authentication Protocol for Low-Cost Tags
-
ACM, New York, NY, USA
-
B. Song, C.J. Mitchell, in RFID Authentication Protocol for Low-Cost Tags. Proceedings of the First ACM Conference on Wireless Network Security (WISEC ’08) (ACM, New York, NY, USA, 2008), pp. 140-147
-
(2008)
Proceedings of the First ACM Conference on Wireless Network Security (WISEC ’08)
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
45
-
-
33745654539
-
RFID-Tags for Anti-Counterfeiting
-
ed. by D. Pointcheval, San Jose, CA, USA. Lecture Notes in Computer Science, Springer, Heidelberg, Feb 13-17
-
P. Tuyls, L. Batina, RFID-Tags for Anti-Counterfeiting. ed. by D. Pointcheval. Topics in Cryptology - CT-RSA - The Cryptographers’ Track at the RSA Conference, San Jose, CA, USA. Lecture Notes in Computer Science, vol. 3860 (Springer, Heidelberg, Feb 13-17 2006), pp. 115-131
-
(2006)
Topics in Cryptology - CT-RSA - the Cryptographers’ Track at the RSA Conference
, vol.3860
, pp. 115-131
-
-
Tuyls, P.1
Batina, L.2
-
46
-
-
38149038702
-
In On Privacy Models for RFID
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
S. Vaudenay, in On Privacy Models for RFID. Advances in Cryptology (ASIACRYPT’07). Lecture Notes in Computer Science, vol. 4833 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2007), pp. 68-87
-
(2007)
Advances in Cryptology (ASIACRYPT’07)
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
47
-
-
21144438831
-
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
-
Lecture Notes in Computer Science, Springer-Verlag, Berlin, Heidelberg, New York, NY
-
S.A. Weis, S. Sarma, R. Rivest, D. Engels, in Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC ’03). Lecture Notes in Computer Science, vol. 2802 (Springer-Verlag, Berlin, Heidelberg, New York, NY, 2003), pp. 454-469
-
(2003)
Proceedings of the 1St International Conference on Security in Pervasive Computing (SPC ’03)
, vol.2802
, pp. 454-469
-
-
Weis, S.A.1
Sarma, S.2
Rivest, R.3
Engels, D.4
|