References
- P. Peris-Lopez, J. C. Hernandez-Castro, J. Estevez-Tapiador, T. Li, and L.Tong Lee, "Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard", RFIDSec 2008, 2008.
- Elif Bilge Kavun and Tolga Yalcin, "A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications", RFIDSec 2010, vol. 6370, pp.258-269, 2010
- M. O'neill, "Low-Cost SHA-1 Hash Function Architecture for RFID Tags", RFIDSec 2008, 2010
- Eun Young Choi, Su Mi Lee, Dong Hong Lee, "Efficient RFID Authentication Protocol for Ubiquitous Computing Environment", Embedded and Ubiquitous Computing, vol. 3823, pp. 945-.954, 2005
- D. Kwon, D. Han, J. Lee, and Y. Yeom, "Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq2005", EUC2006, LNCS 4097, pp. 262-270, 2006.
- JeaCheol Ha, SangJae Moon, Juan Manuel Gonzalez Nieto, Colin Boyd, "Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol", Emerging Technologies in Knowledge Discovery and Data Mining, vol. 4819, pp. 574-583, 2007.
- He Lei, Lu Xin-mei, Jin Song-he, Cai Zeng-yu, "A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System", 2010 2nd International Asia Conference on Informatics in Control, Automation and Robotics, vol.2, pp.269-272, 2010.
- K. Rhee, J. Kwak, S. Kim, and D. Won, "Challenge-Response Based on RFID Authentication Protocol for Distributed Database Environment", SPC'05, LNCS 3450, pp. 70-84, 2005.
- S. Lee, Y. Hwang, D. Lee, and J. Lim, "Efficient Authentication for Low-cost RFID Systems", ICCSA'05, LNCS 3480, pp. 619-627, 2005.
- Dimitriou, "A lightweight RFID protocol to protect against traceability and cloning attacks", Security and Privacy for Emerging Areas in Communications Networks-2005, pp. 59-66, Sep. 2005
- J.C. Ha, J.H. Ha, S.J. Moon, and C. Boyd, "LRMAP: Lightweight and Re- synchronous Mutual Authentication Protocol for RFID System", ICUCT'06, LNCS 4412, pp. 80-89, 2006.