How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks
暂无分享,去创建一个
[1] Christof Paar,et al. Understanding Cryptography , 2018, Springer Berlin Heidelberg.
[2] Muhammad Rashid,et al. Lopez Dahab based elliptic crypto processor (ECP) over GF(2163) for low-area applications on FPGA , 2018, 2018 International Conference on Engineering and Emerging Technologies (ICEET).
[3] Ingrid Verbauwhede,et al. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems , 2007, Comput. Electr. Eng..
[4] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[5] Christof Paar,et al. Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .
[6] Giorgio Di Natale,et al. Hardware Security and Trust , 2017 .
[7] Chris J. Mitchell,et al. Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..
[8] Tanja Lange,et al. Faster Addition and Doubling on Elliptic Curves , 2007, ASIACRYPT.
[9] Raziyeh Salarifard,et al. A Low-Latency and Low-Complexity Point-Multiplication in ECC , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.
[10] Chun Zhang,et al. A research on Denial of Service attack in passive RFID system , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.
[11] Christophe Clavier,et al. Correlation Power Analysis with a Leakage Model , 2004, CHES.
[12] Tanja Lange,et al. Binary Edwards Curves , 2008, CHES.
[13] Lu Zhang,et al. Development and Application of a Chinese Webpage Suicide Information Mining System (Sims) , 2013, Journal of Medical Systems.
[14] Jean-Sébastien Coron,et al. Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.
[15] Stefan Mangard,et al. Power analysis attacks - revealing the secrets of smart cards , 2007 .
[16] Zezhong Zhang,et al. An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography , 2014, Journal of Medical Systems.
[17] Jun Feng,et al. Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.
[18] Bahram Rashidi,et al. Full-custom hardware implementation of point multiplication on binary Edwards curves for application-specific integrated circuit elliptic curve cryptosystem applications , 2017, IET Circuits Devices Syst..
[19] Muhammad Khurram Khan,et al. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.
[20] Cheng Wu,et al. An ECC crypto engine based on binary edwards elliptic curve for low-cost RFID tag chip , 2015, 2015 IEEE 11th International Conference on ASIC (ASICON).
[21] Jue-Sam Chou. An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.
[22] Jean-Pierre Deschamps,et al. Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations , 2013, IEEE Transactions on Industrial Electronics.
[23] Mohsen Machhout,et al. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.