[1] |
MOLNAR D , WAGNER D . Privacy and security in library RFID:issues,practices,and architectures[A]. Proceedings of the 11th ACM Conference on Computer and Communications Security[C]. ACM, 2004. 210-219.
|
[2] |
HA J C , HA J H , MOON S J ,et al. LRMAP:Lightweight and resynChronous Mutual Authentication protocol for RFID System[M]. Springer Berlin Heidelberg, 2007.
|
[3] |
CHEN C L , DENG Y Y . Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection[J]. Engineering Applications of Artificial Intelligence, 2009,22(8): 1284-1291.
|
[4] |
CAI S , LI Y , LI T ,et al. Attacks and improvements to an RIFD mutual authentication protocol and its extensions[A]. Proceedings of the second ACM Conference on Wireless Network Security[C]. ACM, 2009. 51-58.
|
[5] |
PIRAMUTHU S . RFID mutual authentication protocols[J]. Decision Support Systems, 2011,50(2): 387-393.
|
[6] |
FELDHOFER M , DOMINIKUS S , WOLKERSTORFER J . Strong Authentication for RFID Systems Using the AES Algorithm[M]. Springer Berlin Heidelberg, 2004.
|
[7] |
SARMA S E , WEIS S A , ENGELS D W . RFID Systems and Security and Privacy Implications[M]. Springer Berlin Heidelberg, 2003.
|
[8] |
WEIS S A , SARMA S E , RIVEST R L ,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[M]. Springer Berlin Heidelberg, 2004.
|
[9] |
HOPPER N J , BLUM M . Secure Human Identification Protocols[M]. Springer Berlin Heidelberg, 2001.
|
[10] |
肖锋, 周亚建, 周景贤 ,等. 标准模型下可证明安全的 RFID 双向认证协议[J]. 通信学报, 2013,34(4): 82-87. XIAO F , ZHOU Y J , ZHOU J X ,et al. Provable secure mutual authentication protocol for RFID inthe standard model[J]. Journal on Communications, 2013,34(4): 82-87.
|
[11] |
JUELS A . RFID security and privacy:a research survey[J]. IEEE Journal,Selected Areas in Communications, 2006,24(2): 381-394.
|
[12] |
GóDOR G , GICZI N , IMRE S . Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment[A]. Wireless Pervasive Computing (ISWPC),2010 5th IEEE International Symposium[C]. 2010. 331-336.
|
[13] |
蔡庆玲, 詹宜巨, 余松森 等. 基于NTRU公钥密码系统的RFID[J]. 中山大学学报(自然科学版), 2009,48(5): 6-11. CAI Q L , ZHAN Y J , YU S S ,et al. RFID communication security protocol based on NTRU public key cryptosystem[J]. Acta Scientiarum Naturalium Universitatis SunyatSeni, 2009,48(5): 6-11.
|
[14] |
NIEDERREITER H . Knapsack-type cryptosystems and algebraic coding theory[J]. Problems of Control and Information Theory, 1986,15(2): 159-166.
|
[15] |
GALLAGER R G . Low-density parity-check codes[J]. Information Theory,IRE Transactions, 1962,8(1): 21-28.
|
[16] |
MISOCZKI R , TILLICH J P , SENDRIER N ,et al. MDPC-McEliece:New McEliece variants from moderate density parity-check codes[A]. 2013 IEEE International Symposium Information Theory Proceedings (ISIT)[C]. IEEE, 2013. 2069-2073.
|
[17] |
SENDRIER N . On the use of structured codes in code based cryptography[A]. Coding Theory and Cryptography III,The Royal Flemish Academy of Belgium for Science and the Arts[C]. 2010.
|