Weaknesses in two RFID authentication protocols (Q2947080)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Weaknesses in two RFID authentication protocols |
scientific article; zbMATH DE number 6483816
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Weaknesses in two RFID authentication protocols |
scientific article; zbMATH DE number 6483816 |
Statements
Weaknesses in Two RFID Authentication Protocols (English)
0 references
21 September 2015
0 references
McEliece cryptosystem
0 references
RFID
0 references
authentication protocol
0 references
desynchronization attack
0 references
traceability attack
0 references
0.8015955090522766
0 references
0.792029619216919
0 references
0.783488929271698
0 references
0.7814170122146606
0 references
0.7608950734138489
0 references