A low-cost UHF RFID tag chip with AES cryptography engine
暂无分享,去创建一个
Xiang Shen | Lingzhi Fu | Junyu Wang | Linghao Zhu | Junyu Wang | Lingzhi Fu | Xiang Shen | Linghao Zhu
[1] Duong Huynh Thai Vo,et al. A Fully Integrated HF-Band Passive RFID Tag IC Using 0.18- $\mu\hbox{m}$ CMOS Technology for Low-Cost Security Applications , 2011, IEEE Transactions on Industrial Electronics.
[2] G. Gong,et al. Ultra-Lightweight Cryptography for Low-Cost RFID Tags : Hummingbird Algorithm and Protocol , 2009 .
[3] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[4] Li Yin,et al. The design of an RFID security protocol based on RSA signature for e-ticket , 2010, 2010 2nd IEEE International Conference on Information Management and Engineering.
[5] Seok-Cheon Park,et al. A Lightweight ECC Algorithm for Mobile RFID Service , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.
[6] Tim Good,et al. A low-frequency RFID to challenge security and privacy concerns , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[7] Flavio D. Garcia,et al. A Practical Attack on the MIFARE Classic , 2008, CARDIS.
[8] Hyunwoo Kang,et al. A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[9] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .
[10] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[11] Xing Zhang,et al. An UHF RFID transponder with novel demodulator and security algorithm , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.
[12] Irfan Syamsuddin,et al. A Survey of RFID Authentication Protocols Based on Hash-Chain Method , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[13] Nicolas Courtois,et al. Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards , 2008, IACR Cryptol. ePrint Arch..
[14] Hongnian Yu,et al. A RFID mutual authentication protocol based on AES algorithm , 2012, Proceedings of 2012 UKACC International Conference on Control.
[15] O.T.-C. Chen,et al. Passive RFID transponder with power-aware encryption , 2008, 2008 51st Midwest Symposium on Circuits and Systems.
[16] Norbert Giczi,et al. Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment , 2010, IEEE 5th International Symposium on Wireless Pervasive Computing 2010.
[17] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[18] H.C. Luong,et al. Low Power VLSI Design for a RFID Passive Tag baseband System Enhanced with an AES Cryptography Engine , 2007, 2007 1st Annual RFID Eurasia.
[19] Elisabeth Oswald,et al. An ASIC Implementation of the AES SBoxes , 2002, CT-RSA.
[20] David Evans,et al. Reverse-Engineering a Cryptographic RFID Tag , 2008, USENIX Security Symposium.
[21] Chih-Tsun Huang,et al. A High-Throughput Low-Power AES Cipher for Network Applications , 2007, 2007 Asia and South Pacific Design Automation Conference.
[22] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[23] Ilaria De Munari,et al. Design of an Ultra Low-Power RFID Baseband Processor Featuring an AES Cryptography Engine , 2008, 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools.
[24] Feng Xiaoxing,et al. Design and implementation of a security-enhanced baseband system for UHF RFID tag , 2009, 2009 IEEE 8th International Conference on ASIC.
[25] Hung-Min Sun,et al. A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.
[26] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[27] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.