Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
RFID System Security Using Identity-Based Cryptography
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
RFID and Its Vulnerability to Faults
CHES '08 Proceeding sof the 10th international workshop on Cryptographic Hardware and Embedded Systems
Anti-counterfeit ownership transfer protocol for low cost RFID system
WSEAS Transactions on Computers
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A secure elliptic curve-based RFID protocol
Journal of Computer Science and Technology
Robust Authentication Using Physically Unclonable Functions
ISC '09 Proceedings of the 12th International Conference on Information Security
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices
Information Security Applications
Trust in RFID-enabled Supply-Chain Management
International Journal of Security and Networks
An efficient authentication protocol for RFID systems resistant to active attacks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
ALGSICS: combining physics and cryptography to enhance security and privacy in RFID systems
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Efficient architectures for elliptic curve cryptography processors for RFID
ICCD'09 Proceedings of the 2009 IEEE international conference on Computer design
An access control model for mobile physical objects
Proceedings of the 15th ACM symposium on Access control models and technologies
Challenges of secure and reliable data management in heterogeneous environments
Proceedings of the First International Workshop on Digital Engineering
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Lighten encryption schemes for secure and private RFID systems
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Using zero knowledge to share a little knowledge: bootstrapping trust in device networks
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
RFID protocol evaluation using Bayesian networks
ACMOS'09 Proceedings of the 11th WSEAS international conference on Automatic control, modelling and simulation
ACM Transactions on Information and System Security (TISSEC)
Attacking an AES-Enabled NFC tag: implications from design to a real-world scenario
COSADE'12 Proceedings of the Third international conference on Constructive Side-Channel Analysis and Secure Design
Security Risks Associated with Radio Frequency Identification in Medical Environments
Journal of Medical Systems
Context-aware web services for security control and privacy preservation in an RFID supply chain
International Journal of Information Technology and Management
Minimalist security and privacy schemes based on enhanced AES for integrated WISP sensor networks
International Journal of Communication Networks and Distributed Systems
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
Hi-index | 0.00 |
RFID-tags are a new generation of bar-codes with added functionality. An emerging application is the use of RFID-tags for anti-counterfeiting by embedding them into a product. Public-key cryptography (PKC) offers an attractive solution to the counterfeiting problem but whether a publickey cryptosystem can be implemented on an RFID tag or not remains unclear. In this paper, we investigate which PKC-based identification protocols are useful for these anti-counterfeiting applications. We also discuss the feasibility of identification protocols based on Elliptic Curve Cryptography (ECC) and show that it is feasible on RFID tags. Finally, we compare different implementation options and explore the cost that side-channel attack countermeasures would have on such implementations.