RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Efficient RFID authentication protocol for ubiquitous computing environment
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Computer Standards & Interfaces
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Journal of Parallel and Distributed Computing
Algebraic Attacks on RFID Protocols
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Evaluation of the simple mutual authentication protocol for ISO/IEC 14443 smart cards
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Privacy protection scheme of RFID using random number
PAKDD'07 Proceedings of the 2007 international conference on Emerging technologies in knowledge discovery and data mining
Anonymous mutual authentication protocol for RFID tag without back-end database
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Weaknesses in a recent ultra-lightweight RFID authentication protocol
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Mutual authentication scheme for EPC tags- readers in the supply chain
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
A lightweight anti-desynchronization RFID authentication protocol
Information Systems Frontiers
Lightweight mutual authentication protocol for securing RFID applications
International Journal of Internet Technology and Secured Transactions
A survey on RFID security and provably secure grouping-proof protocols
International Journal of Internet Technology and Secured Transactions
Cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Strong authentication and strong integrity (SASI) is not that strong
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Tree-based RFID authentication protocols are definitively not privacy-friendly
RFIDSec'10 Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
Improvement of the RFID authentication scheme based on quadratic residues
Computer Communications
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
Journal of Network and Computer Applications
Security threat mitigation trends in low-cost RFID systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Security analysis of an ultra-lightweight RFID authentication protocol—SLMAP*
Security and Communication Networks
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
APNOMS'07 Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services
Desynchronization attack on RAPP ultralightweight authentication protocol
Information Processing Letters
Improving the efficiency of RFID authentication with pre-computation
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
RFID Authentication Protocol to Enhance Patient Medication Safety
Journal of Medical Systems
Hardware implementation of tag-reader mutual authentication protocol for RFID systems
Integration, the VLSI Journal
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Journal of Network and Computer Applications
Security analysis of LMAP using AVISPA
International Journal of Security and Networks
Hi-index | 0.00 |
RFID tags are devices of very limited computational capabilities, which only have 250-3K logic gates that can be devoted to security-related tasks Many proposals have recently appeared, but all of them are based on RFID tags using classical cryptographic primitives such as PRNGs, hash functions, block ciphers, etc We believe this assumption to be fairly unrealistic, as classical cryptographic constructions lie well beyond the computational reach of very low-cost RFID tags A new approach is necessary to tackle this problem, so we propose an extremely efficient lightweight mutual-authentication protocol that offers an adequate security level for certain applications and can be implemented even in the most limited low-cost RFID tags, as it only needs around 150 gates.