Chaos Based RFID Authentication Protocol
暂无分享,去创建一个
[1] Li-Hai Zhou,et al. A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach , 2000 .
[2] Leon O. Chua,et al. Transmission of Digital signals by Chaotic Synchronization , 1992, Chua's Circuit.
[3] K. Wong,et al. A secure communication scheme based on the phase synchronization of chaotic systems. , 2003, Chaos.
[4] Ying-Cheng Lai,et al. Controlling chaos , 1994 .
[5] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[6] José D. P. Rolim,et al. A Comparative Study of Performance of AES Final Candidates Using FPGAs , 2000, CHES.
[7] D. R. Frey,et al. Chaotic digital encoding: an approach to secure communication , 1993 .
[8] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[9] Mingsheng Liu,et al. RFID System Information Security Based on Chaotic Encryption , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.
[10] Carroll,et al. Synchronization in chaotic systems. , 1990, Physical review letters.
[11] Gildas Avoine,et al. The Swiss-Knife RFID Distance Bounding Protocol , 2008, ICISC.
[12] E. Lorenz. Deterministic nonperiodic flow , 1963 .
[13] Ljupco Kocarev,et al. From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[14] Christini,et al. Using noise and chaos control to control nonchaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[15] Xiaowen Li,et al. A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.
[16] Michael Peter Kennedy,et al. The role of synchronization in digital communications using chaos. I . Fundamentals of digital communications , 1997 .
[17] K. Wong,et al. Phase signal coupling induced n:m phase synchronization in drive-response oscillators. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[18] Jacques Reverdy,et al. RFID Noisy Reader How to Prevent from Eavesdropping on the Communication? , 2007, CHES.
[19] M. Hasler,et al. Communication by chaotic signals : the inverse system approach , 1996 .
[20] Leon O. Chua,et al. EXPERIMENTAL CHAOS SYNCHRONIZATION IN CHUA'S CIRCUIT , 1992 .
[21] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[22] Juan Manuel González Nieto,et al. Detecting relay attacks with timing-based protocols , 2007, ASIACCS '07.
[23] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[24] Kris Gaj,et al. Very Compact FPGA Implementation of the AES Algorithm , 2003, CHES.
[25] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[26] Leon O. Chua,et al. Spread Spectrum Communication Through Modulation of Chaos , 1993 .
[27] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[28] Alan V. Oppenheim,et al. Circuit implementation of synchronized chaos with applications to communications. , 1993, Physical review letters.
[29] Jonathan Katzand,et al. Parallel and Concurrent Security of the HB and HB + Protocols , 2006 .
[30] Avishai Wool,et al. Picking Virtual Pockets using Relay Attacks on Contactless Smartcard , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[31] Johan A. K. Suykens,et al. Nonlinear modeling : advanced black-box techniques , 1998 .
[32] Qurban A. Memon. Synchronized chaos for network security , 2003, Comput. Commun..
[33] Ali Miri,et al. Chaotic masking for securing RFID systems against relay attacks , 2013, Secur. Commun. Networks.
[34] Gerhard P. Hancke,et al. Confidence in smart token proximity: Relay attacks revisited , 2009, Comput. Secur..
[35] Flavio D. Garcia,et al. A Practical Attack on the MIFARE Classic , 2008, CARDIS.
[36] Kurths,et al. Phase synchronization of chaotic oscillators. , 1996, Physical review letters.
[37] Soo-Chang Pei,et al. Generating Chaotic Stream Ciphers Using Chaotic Systems , 2003 .
[38] Yasuji Sawada,et al. Practical Methods of Measuring the Generalized Dimension and the Largest Lyapunov Exponent in High Dimensional Chaotic Systems , 1987 .
[39] Guido Bertoni,et al. Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.
[40] Gildas Avoine,et al. An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks , 2008, ArXiv.
[41] Gregory W. Wornell,et al. Signal processing in the context of chaotic signals , 1992, [Proceedings] ICASSP-92: 1992 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[42] Jonathan Katz,et al. Parallel and Concurrent Security of the HB and HB+ Protocols , 2006, EUROCRYPT.
[43] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[44] Kevin M. Short,et al. Signal Extraction from Chaotic Communications , 1997 .
[45] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[46] L. Tsimring,et al. Generalized synchronization of chaos in directionally coupled chaotic systems. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[47] Cédric Lauradoux,et al. When Compromised Readers Meet RFID , 2009, WISA.
[48] Steven J. Murdoch,et al. Keep Your Enemies Close: Distance Bounding Against Smartcard Relay Attacks , 2007, USENIX Security Symposium.
[49] Holger Kantz,et al. Practical implementation of nonlinear time series methods: The TISEAN package. , 1998, Chaos.
[50] Flavio D. Garcia,et al. Wirelessly Pickpocketing a Mifare Classic Card , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[51] Srdjan Capkun,et al. Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars , 2010, NDSS.
[52] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[53] Tomasz Kapitaniak,et al. Controlling Chaos: Theoretical and Practical Methods in Non-linear Dynamics , 1996 .
[54] M. Rosenstein,et al. A practical method for calculating largest Lyapunov exponents from small data sets , 1993 .
[55] Martin Hlavác,et al. A Note on the Relay Attacks on e-passports: The Case of Czech e-passports , 2007, IACR Cryptol. ePrint Arch..
[56] Jorge Munilla,et al. Enhanced low-cost RFID protocol to detect relay attacks , 2010, CMC 2010.
[57] Mustapha Djeddou,et al. An FPGA Real-time Implementation of the Chen's Chaotic System for Securing Chaotic Communications , 2009 .
[58] Roberto Barrio,et al. Bounds for the chaotic region in the Lorenz model , 2009 .
[59] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[60] James A. Yorke,et al. Preturbulence: A regime observed in a fluid flow model of Lorenz , 1979 .
[61] Hong Zhou,et al. Problems with the chaotic inverse system encryption approach , 1997 .
[62] C. Sparrow. The Lorenz Equations: Bifurcations, Chaos, and Strange Attractors , 1982 .
[63] Hartmut Benner,et al. Chaos suppression in the parametrically driven Lorenz system. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.
[64] Edward Ott,et al. Controlling chaos , 2006, Scholarpedia.
[65] Gerhard P. Hancke. Modulating a noisy carrier signal for eavesdropping-resistant HF RFID , 2007, Elektrotech. Informationstechnik.
[66] Michael Peter Kennedy,et al. The role of synchronization in digital communications using chaos. II. Chaotic modulation and chaotic synchronization , 1998 .
[67] Michael Peter Kennedy,et al. Three steps to chaos. I. Evolution , 1993 .
[68] F. Vivaldi,et al. An algorithmic view of pseudochaos , 1999 .
[69] Wang Shaohui. Security Flaws in Two RFID Lightweight Authentication Protocols , 2011 .
[70] A. Wolf,et al. Determining Lyapunov exponents from a time series , 1985 .
[71] Hongnian Yu,et al. A RFID mutual authentication protocol based on AES algorithm , 2012, Proceedings of 2012 UKACC International Conference on Control.
[72] Barry Saltzman,et al. Finite Amplitude Free Convection as an Initial Value Problem—I , 1962 .
[73] Roberto Barrio,et al. A three-parametric study of the Lorenz model , 2007 .
[74] Shujun Li,et al. When Chaos Meets Computers , 2004, nlin/0405038.