The Design of Rijndael
A Fast New DES Implementation in Software
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Some complexity questions related to distributive computing(Preliminary Report)
STOC '79 Proceedings of the eleventh annual ACM symposium on Theory of computing
Protocols for RFID tag/reader authentication
Decision Support Systems
IEEE Transactions on Dependable and Secure Computing
A Survey of Lightweight-Cryptography Implementations
IEEE Design & Test
High-Speed True Random Number Generation with Logic Gates Only
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Formal apparatus for measurement of lightweight protocols
Computer Standards & Interfaces
A case against currently used hash functions in RFID protocols
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The feasibility of security solution for RFID tags relies heavily on its hardware cost and performance. In the literature the term lightweight solution is used liberally and causes problems when selecting a solution for e.g. RFID environment. Evaluating the actually feasibility of the solution requires electrical engineering skills that many security developers and decision makers may lack. In this paper we describe simple guidelines for approximating the feasibility of the security solution in terms of gates and clock cycles. These guidelines make it easier to evaluate the cryptographic solutions feasibility for targeted hardware and provide a basis for categorisation of lightweight security solutions.