Low-cost digital signature architecture suitable for radio frequency identification tags
暂无分享,去创建一个
[1] Martin Hell,et al. The Grain Family of Stream Ciphers , 2008, The eSTREAM Finalists.
[2] Russell Miller,et al. A Low-Power Design for an Elliptic Curve Digital Signature Chip , 2002, CHES.
[3] Máire O'Neill,et al. Public Key Cryptography and RFID Tags , 2007, CT-RSA.
[4] D. M. Konidala,et al. A Simple and Cost-effective RFID Tag-Reader Mutual Authentication Scheme , 2007, RFID 2007.
[5] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[6] Hugo Krawczyk,et al. Strengthening Digital Signatures Via Randomized Hashing , 2006, CRYPTO.
[7] Jacques Stern,et al. Security Analysis of a Practical "on the fly" Authentication and Signature Generation , 1998, EUROCRYPT.
[8] István Vajda,et al. Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .
[9] Howon Kim,et al. Low power implementation of SHA-1 algorithm for RFID system , 2006, 2006 IEEE International Symposium on Consumer Electronics.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[12] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[13] Johannes Wolkerstorfer,et al. ECC Processor with Low Die Size for RFID Applications , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[14] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[15] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[16] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[17] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[18] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[19] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[20] Máire O'Neill,et al. New Architectures for Low-Cost Public Key Cryptography on RFID Tags , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[21] Akashi Satoh,et al. ASIC hardware focused comparison for hash functions MD5, RIPEMD-160, and SHS , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[22] Behrooz Parhami,et al. Computer arithmetic - algorithms and hardware designs , 1999 .
[23] Matthew J. B. Robshaw,et al. The eSTREAM Project , 2008, The eSTREAM Finalists.
[24] Maire O'Neill,et al. Low-Cost SHA-1 Hash Function Architecture for RFID Tags , 2008 .
[25] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[26] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[27] Stephen A. Weis. Security and Privacy in Radio-Frequency Identification Devices , 2003 .
[28] Berk Sunar,et al. Energy Comparison of AES and SHA-1 for Ubiquitous Computing , 2006, EUC Workshops.
[29] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[30] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[31] Roberto Di Pietro,et al. RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).