LMAP : A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags
暂无分享,去创建一个
[1] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[2] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[3] G. Marsaglia,et al. Some Difficult-to-pass Tests of Randomness , 2022 .
[4] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[5] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[6] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[7] Berk Sunar,et al. Universal Hash Functions for Emerging Ultra-Low-Power Networks , 2004 .
[8] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[9] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[10] Stephen A. Weis. Security parallels between people and pervasive devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[11] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[12] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[13] François-Xavier Standaert,et al. State of the Art in Hardware Architectures , 2005 .
[14] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[15] Dong Hoon Lee,et al. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.
[16] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[17] Kwangjo Kim,et al. Mutual Authentication Protocol for Low-cost RFID , 2005, CRYPTO 2005.
[18] Christoph Ruland,et al. Analysis of Power Constraints for Cryptographic Algorithms in Mid-Cost RFID Tags , 2006, CARDIS.