References
- Stepan A. Weis, Sanjay E. Sarma, Ronald L. Rivest, and Daniel W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Security in Pervasive Computing - SPC 2003, LNCS 2802, pp.201-212, 2004 https://doi.org/10.1007/978-3-540-39881-3_18
- Miyako Ohkubo, Koutarou Suzuki, and Shingo Kinoshita, “Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-cost RFID,” Proceedings of the SCIS 2004, pp.719-724, 2004
- Keunwoo Rhee, Jin Kwak, Seungjoo Kim, and Dongho Won, “Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment,” International Conference on Security in Pervasive Computing Environments, pp.70-84, 2005. Springer
- K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer”, Computational Intelligence and Security, 2006 International Conference on, Vol.2, No.1, 2006, pp.1090-1095 https://doi.org/10.1007/978-3-540-74377-4_81
- 류석, “공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구,” 정보처리학회논문지C Vol.13C, No.7, pp.837-842, 2006 https://doi.org/10.3745/KIPSTC.2006.13C.7.837
- 김창훈, “타원곡선 암호 시스템의 고속 구현을 위한 VLSI 구조,” 정보처리학회논문 C Vol.15C, No.2, pp.133-140, 2008 https://doi.org/10.3745/KIPSTC.2008.15-C.2.133
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. “Strong authentication for RFID systems using AES algorithm,” In Conference of Cryptographic Hardware and Embedded Systems, 2004. Proceedings, pp.357-370, Springer 2004
- M. Feldhofer and Christian Rechberger, “A Case against Currently Used Hash Functions in RFID Protocols,” OTM Workshops 2006, LNCS 4277, pp.372-381, 2006 https://doi.org/10.1007/11915034_61
- 구본석, 유권호, 양상운, 장태주, 이상진, “RFID 태그를 위한 초소형 AES 연산기의 구현”, 정보보호학회논문지, 제16권 제5호, pp.67-77, 2006
- Chae Hoon Lim and Tymur Korkishko, “mCrtton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors,” WISA 2005, LNCS 3786, pp.243-258, 2006 https://doi.org/10.1007/11604938_19
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee, “HIGHT: A New Block Cipher Suitale for Low-Resource Device”, CHES 2006, LNCS 4249, pp. 46-59, 2006 https://doi.org/10.1007/11894063_4
- Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshow, Yannick Seurin, and C. Vikkelsoe, “HEIGHT: PRESENT: An Ultra-Lightweight Block Cipher”, CHES 2007, LNCS 4727, pp.450-466, 2007 https://doi.org/10.1007/978-3-540-74735-2_31
- B. Toiruul and KyungOh Lee, “An Advanced Mutual- Authentication Algorithn Using AES for RFID Systems”, IJCSNS International Journal of Computer Science and Network Security, Vol.6, No.9B, pp.156-162, September, 2006
- KLAUS FINKENZELLER, 'RFID Handbook: Fundamentals and Application in Contactless Smart Cards and Identification', 2nd EdD.,John Wiley & Sons, Ltd. 2003, pp.223.
- S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola, V. Khandelwal, “Design and Implementation of PUF-Based 'Unclonable' RFID ICs for Anti-Counterfeiting and Security Applications”, 2008 IEEE International Conference on RFID, 16-17 April, 2008, pp.58-64, Las Vegas, USA
- L. Bolotnyy and G. Robins, “Physically Unclonable Function-Based Security and Privacy in RFID Systems”, in Proc. IEEE International Conference on Pervasive Computing and Communications(PerCom 2007), pp.211-218, March, 2007 https://doi.org/10.1109/PERCOM.2007.26
- P.Tuyls and L. Batina, “RFID-Tags for Anti-Counterfeiting”, Topics in Cryptology-CT-RSA 2006, Vol.3860, pp. 115-131 https://doi.org/10.1007/11605805_8
- L. Kulseng, Z. Yu, Y. Wei and Y. Guan, “Lightweight Secure Search Protocols for Low-cost RFID Systems,” 2009 29th IEEE International Conference on Distributed Computing Systems, pp.40-48 https://doi.org/10.1109/ICDCS.2009.12
- L. Kulseng, “Lightweight Mutual Authentication, Owner Transfer, and Secure Search Protocols for RFID Systems,” A thesis for the degree of MASTER OF SCIENCE, Iowa State University, Ames, Iowa, 2009
- 최은영, 최동희, 임종인, 이동훈, “저가형 RFID 시스템을 위한 효율적인 인증 프로토콜,” 정보보호학회논문지 15권 5호, pp59-71, 2005
- D. Nguyen Duc, J. Park, H. Lee and K. Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning,” Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan
- Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez Tapiador, and Arturo Ribagorda, “LAMP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Proc. Second Workshop RFID Security, July 2006
- Ari Juels, “RFID Security and Privacy: A Research Survey,” IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol.24, No.2, Feb., 2006 https://doi.org/10.1109/JSAC.2005.861395
- Sandra Dominikus, Elisabeth Oswald, and Martin Feldhofer, “Symmetric Authentication for RFID Systems in Practice”, Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, Jul., 2005
- Sungbae Ji, “RFID-enabled Extensible Authentication Framework and Its Applications,” A thesis for the Degree of Master, ICU, 2008
- S. Kang, D. Lee, and I. Lee, “A study on secure RFID mutual authentication scheme in pervasive computing environment” Computer Communications 31, 2008, pp.4248-4254 https://doi.org/10.1016/j.comcom.2008.05.006