Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
暂无分享,去创建一个
Ronald L. Rivest | Daniel W. Engels | Sanjay E. Sarma | Stephen A. Weis | R. Rivest | S. Sarma | D. Engels
[1] Martín Abadi,et al. Authentication and Delegation with Smart-cards , 1991, TACS.
[2] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[3] Markus G. Kuhn,et al. Low Cost Attacks on Tamper Resistant Devices , 1997, Security Protocols Workshop.
[4] Ran Canetti,et al. Perfectly one-way probabilistic hash functions (preliminary version) , 1998, STOC '98.
[5] Sean W. Smith,et al. Smart cards in hostile environments , 1996 .
[6] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[7] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[8] Benny Bing. Broadband Wireless Access , 2000 .
[9] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[10] Stefan Lucks,et al. On the Minimal Hardware Complexity of Pseudorandom Function Generators , 2001, STACS.
[11] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[12] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[13] Ran Canetti,et al. Perfectly One-Way Probabilistic Hash Functions , 1998, Symposium on the Theory of Computing.
[14] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[15] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[16] Suresh Chari,et al. A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards , 1999 .
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] 中村 修,et al. 20世紀の名著名論:Robert M. Metcalfe and David R. Boggs : Ethernet : Distributed Packet Switching for Local Computer Networks , 2003 .
[19] Gordon Bell,et al. Ethernet: Distributed Packet Switching for Local Computer Networks , 1976 .
[20] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[21] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[22] Ari Juels,et al. Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.
[23] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[24] Paul C. Kocher. Cryptanalysis of Di e-Hellman, RSA, DSS, and Other Systems Using Timing Attacks , 1999 .