1 |
P. Ekdahl, and T. Johansson, "Another attack on A5/l ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003
DOI
ScienceOn
|
2 |
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. W orkshopCryptographic Hardware Embedded Syst. (CHES 2004), Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, vol. 3156, pp. 357-370
DOI
|
3 |
Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008
DOI
ScienceOn
|
4 |
Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
|
5 |
S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212
DOI
ScienceOn
|
6 |
I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, 2003, pp.76-82
|
7 |
M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.3156, pp.357-370, 2004
DOI
|
8 |
Yong Ki Lee, etcs, "Elliptic Curve Based Security Processor for RFID", IEEE Transactions on Computers, v.57. n.ll, pp. 1514-1526, NOV. 2008
DOI
ScienceOn
|
9 |
Martin Feldhofer, "Strong crypto for RFID Tag, A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842
DOI
|
10 |
G.Gaubatz, et.al, "Public key Cryptography in sensor network", 1st European workshop on security in Ad Hoc and sensor networks", ESAS 2004, Aug.2004
|
11 |
Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
|
12 |
Mangard,S, et aI, "Power analyses attacks-revealing the secrets of smartcards", Springer-ISBN: 0-38730857-1,2007
|