Low-cost cryptography for privacy in RFID systems
From MaRDI portal
Publication:3452239
DOI10.1007/11733447_17zbMATH Open1333.94032OpenAlexW1508287424MaRDI QIDQ3452239FDOQ3452239
Authors: Benoît Calmels, Sébastien Canard, Marc Girault, Hervé Sibert
Publication date: 11 November 2015
Published in: Smart Card Research and Advanced Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11733447_17
Recommendations
Cites Work
- Title not available (Why is that?)
- Authenticating Pervasive Devices with Human Protocols
- Group Signatures
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic hardware and embedded systems -- CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11--13, 2004. Proceedings.
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Financial Cryptography and Data Security
- Minimalist cryptography for low-cost RFID tags (extended abstract)
Cited In (20)
- Information Security and Privacy
- Reducing Time Complexity in RFID Systems
- On Privacy Models for RFID
- Public Key Cryptography and RFID Tags
- Cryptographic Hardware and Embedded Systems - CHES 2004
- From Passive to Covert Security at Low Cost
- Shoehorning Security into the EPC Tag Standard
- Information Security
- Noisy Cryptographic Protocols for Low-Cost RFID Tags
- RFID Privacy Based on Public-Key Cryptography
- Minimalist cryptography for low-cost RFID tags (extended abstract)
- Leakage-resilient RFID authentication with forward-privacy
- RFID Security: Tradeoffs between Security and Efficiency
- Private identification of RFID tags
- A pre-computable signature scheme with efficient verification for RFID
- Hierarchical ECC-based RFID authentication protocol
- Lighten encryption schemes for secure and private RFID systems
- Title not available (Why is that?)
- Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System
- Lightweight privacy preserving authentication for RFID using a stream cipher
Uses Software
This page was built for publication: Low-cost cryptography for privacy in RFID systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3452239)