Comments on “Theory and applications of cellular automata in cryptography”
IEEE Transactions on Software Engineering
Communications of the ACM
A new kind of science
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Design of Rijndael
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Universally Composable Security: A New Paradigm for Cryptographic Protocols
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
Privacy and security in library RFID: issues, practices, and architectures
Proceedings of the 11th ACM conference on Computer and communications security
A Scalable and Provably Secure Hash-Based RFID Protocol
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Strengthening EPC tags against cloning
Proceedings of the 4th ACM workshop on Wireless security
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
YA-TRAP: Yet Another Trivial RFID Authentication Protocol
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
A Lightweight RFID Protocol to protect against Traceability and Cloning attacks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Computer
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol
ARES '07 Proceedings of the The Second International Conference on Availability, Reliability and Security
Physically Unclonable Function-Based Security and Privacy in RFID Systems
PERCOM '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications
Cryptanalysis of Two Lightweight RFID Authentication Schemes
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Defining Strong Privacy for RFID
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
IEEE Transactions on Dependable and Secure Computing
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
Computer Standards & Interfaces
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Security Analysis of the SASI Protocol
IEEE Transactions on Dependable and Secure Computing
Secure communication for RFIDs proactive information security within computational security
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
RFID privacy using spatially distributed shared secrets
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Privacy of recent RFID authentication protocols
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Keep on blockin' in the free world: personal access control for low-cost RFID tags
Proceedings of the 13th international conference on Security protocols
Extracting secret keys from integrated circuits
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Noisy tags: a pretty good key exchange protocol for RFID tags
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
RFID traceability: a multilayer problem
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
RFID guardian: a battery-powered mobile device for RFID privacy management
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
RFID-Tags for anti-counterfeiting
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
M2AP: a minimalist mutual-authentication protocol for low-cost RFID tags
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Minimalist cryptography for low-cost RFID tags (extended abstract)
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
EMAP: an efficient mutual-authentication protocol for low-cost RFID tags
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Some methods for privacy in RFID communication
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Parallel and concurrent security of the HB and HB+ protocols
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
High-Power proxies for enhancing RFID privacy and utility
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Hi-index | 0.00 |
The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and academia. One main focus of research interests is the authentication and privacy techniques to prevent attacks targeting the insecure wireless channel of these systems. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints, such as production costs, power consumption, time of response, and regulations compliance, makes the use of traditional cryptography in these systems a very challenging problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.