Redundant Bit Security in RFIDs: Architecture Design and Security Performance Evaluation
暂无分享,去创建一个
[1] George Athanasiou,et al. Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs , 2016, J. Circuits Syst. Comput..
[2] Juan E. Tapiador,et al. Efficient ASIC Implementation and Analysis of Two EPC-C1G2 RFID Authentication Protocols , 2013, IEEE Sensors Journal.
[3] Christof Paar,et al. Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents , 2008, CARDIS.
[4] Saurabh Kumar,et al. Iterative and Fully Pipelined High Throughput Efficient Architectures of AES in FPGA and ASIC , 2016, J. Circuits Syst. Comput..
[5] Martin Feldhofer,et al. A Case Against Currently Used Hash Functions in RFID Protocols , 2006, OTM Workshops.
[6] Bart De Decker,et al. Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices , 2016, Secur. Commun. Networks.
[7] Daniel W. Engels,et al. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.
[8] Avishai Wool,et al. Implementing public-key cryptography on passive RFID tags is practical , 2015, International Journal of Information Security.
[9] Andrey Bogdanov,et al. Hash Functions and RFID Tags: Mind the Gap , 2008, CHES.
[10] Martin Hell,et al. Grain-128a: a new version of Grain-128 with optional authentication , 2011, Int. J. Wirel. Mob. Comput..
[11] A. W. Roscoe,et al. New combinatorial bounds for universal hash functions , 2009, IACR Cryptol. ePrint Arch..
[12] Reza Azarderakhsh,et al. Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.
[13] Guang Gong,et al. WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] Kah Phooi Seng,et al. A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments , 2015, J. Netw. Comput. Appl..
[16] Salah Harb,et al. Very Compact and Efficient 32-Bit AES Core Design Using FPGAs for Small-Footprint Low-Power Embedded Applications , 2016, J. Circuits Syst. Comput..
[17] Martin Hell,et al. On Hardware-Oriented Message Authentication with Applications towards RFID , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.
[18] Jian Cheng,et al. Design and Implementation of An ECC-Based Digital Baseband Controller for RFID Tag Chip , 2015, IEEE Transactions on Industrial Electronics.
[19] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[20] Magdy Bayoumi,et al. A Novel Authenticated Cipher for RFID Systems , 2014 .
[21] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[22] Magdy A. Bayoumi,et al. RBS: Redundant Bit Security Algorithm for RFID Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[23] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.