How to Develop ECC-Based Low Cost RFID Tags Robust Against Side-Channel Attacks

[1]  Christof Paar,et al.  Understanding Cryptography , 2018, Springer Berlin Heidelberg.

[2]  Muhammad Rashid,et al.  Lopez Dahab based elliptic crypto processor (ECP) over GF(2163) for low-area applications on FPGA , 2018, 2018 International Conference on Engineering and Emerging Technologies (ICEET).

[3]  Ingrid Verbauwhede,et al.  Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems , 2007, Comput. Electr. Eng..

[4]  P. L. Montgomery Speeding the Pollard and elliptic curve methods of factorization , 1987 .

[5]  Christof Paar,et al.  Understanding Cryptography: A Textbook for Students and Practitioners , 2009 .

[6]  Giorgio Di Natale,et al.  Hardware Security and Trust , 2017 .

[7]  Chris J. Mitchell,et al.  Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..

[8]  Tanja Lange,et al.  Faster Addition and Doubling on Elliptic Curves , 2007, ASIACRYPT.

[9]  Raziyeh Salarifard,et al.  A Low-Latency and Low-Complexity Point-Multiplication in ECC , 2018, IEEE Transactions on Circuits and Systems I: Regular Papers.

[10]  Chun Zhang,et al.  A research on Denial of Service attack in passive RFID system , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[11]  Christophe Clavier,et al.  Correlation Power Analysis with a Leakage Model , 2004, CHES.

[12]  Tanja Lange,et al.  Binary Edwards Curves , 2008, CHES.

[13]  Lu Zhang,et al.  Development and Application of a Chinese Webpage Suicide Information Mining System (Sims) , 2013, Journal of Medical Systems.

[14]  Jean-Sébastien Coron,et al.  Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems , 1999, CHES.

[15]  Stefan Mangard,et al.  Power analysis attacks - revealing the secrets of smart cards , 2007 .

[16]  Zezhong Zhang,et al.  An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography , 2014, Journal of Medical Systems.

[17]  Jun Feng,et al.  Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.

[18]  Bahram Rashidi,et al.  Full-custom hardware implementation of point multiplication on binary Edwards curves for application-specific integrated circuit elliptic curve cryptosystem applications , 2017, IET Circuits Devices Syst..

[19]  Muhammad Khurram Khan,et al.  A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.

[20]  Cheng Wu,et al.  An ECC crypto engine based on binary edwards elliptic curve for low-cost RFID tag chip , 2015, 2015 IEEE 11th International Conference on ASIC (ASICON).

[21]  Jue-Sam Chou An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.

[22]  Jean-Pierre Deschamps,et al.  Efficient Elliptic Curve Point Multiplication Using Digit-Serial Binary Field Operations , 2013, IEEE Transactions on Industrial Electronics.

[23]  Mohsen Machhout,et al.  Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag , 2018, Journal of Electronic Testing.