[1] |
张学军, 陈彦君, 常昆 . 改进型RFID相互认证协议研究[J]. 计算机技术与发展 2013,23(8):129-132. ZHANG X J , CHEN Y J , CHANG K . An improved RFID mutual authentication protocol[J]. Computer Technology and Development, 2013 23(8):129-132.
|
[2] |
张兵, 马新新, 秦志光 . 轻量级RFID双向认证协议设计与分析[J]. 电子科技大学学报 2013,42(3):425-430. ZHANG B , MA X X , QIN Z G . Design and analysis of a lightweight mutual authentication protocol for RFID[J]. Design and analysis of a lightweight mutual authentication protocol for RFID, 2013 42(3):425-430.
|
[3] |
张文芳, 王小敏, 郭伟 等. 基于椭圆曲线密码体制的高效虚拟企业跨域认证方案[J]. 电子学报 2014,42(6):1095-1102. ZHANG W F , WANG X M , GUO W et al. An efficient inter-enterprise authentication scheme for VE based on the elliptic curve cryptosystem[J]. Acta Electronica Sinica, 2014 42(6):1095-1102.
|
[4] |
王明辉, 王建东 . 高效的RFID双向认证协议[J]. 计算机应用 2011,31(10):2694-2696. WANG M H , WANG J D . Efficient RFID mutual authentication protocol[J]. Journal of Computer Applications, 2011,31(10):2694-2696.
|
[5] |
ARBIT A , OREN Y , WOOL A . Toward practical public key anti-counterfeiting for low-cost EPC tags[C]// 2011 IEEE International Conference on RFID, April 12-14, 2011, Orlando,FL,USA. New Jersey: IEEE Press, 2011: 184-191.
|
[6] |
GODOR G , IMRE S . Elliptic curve cryptography based authentication protocol for low-cost RFID tags[C]// 2011 IEEE International Conference on RFID-Technologies and Applications(RFID-TA), Sept 15-16, 2011, Sitges,Spain. New Jersey: IEEE Press, 2011: 386-393.
|
[7] |
CHEN Z , LI L , WU Y , et al. A mutual authentication improvement for traditional unidirectional ECDLP-based RFID authentication protocols[C]// 2012 Second International Conference on Electric Information and Control Engineering-Volume 02, 2012, LA,CA,USA. Washington:IEEE Computer Society, 2012: 421-432.
|
[8] |
FARASH M S . Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography[J]. Journal of Supercomputing, 2014,70(2): 987-1001.
|
[9] |
吴焘, 李树国, 刘理天 . 一种新的余数系统下快速计算素域椭圆曲线点乘的方法[J]. 计算机工程与科学 2014,36(10):1839-1845. WU T , LI S G , LIU L T . A new RNS approach for fast Fp elliptic curve point multiplication[J]. Computer Engineering and Science, 2014 36(10):1839-1845.
|
[10] |
庞世春, 刘淑芬, 从福仲 等. 一种Montgomery型椭圆曲线的高效标量乘算法[J]. 电子学报 2011,39(4):865-868. PANG S C , LIU S F , CONG F Z et al. An efficient scalar multiplication algorithm on Montgomery-form elliptic curve[J]. ACTA Electronica Sinica, 2011 39(4):865-868.
|
[11] |
ALKHATIB M , JAAFAR A , MRM S , et al. Parallelizing GF(p) Montgomery elliptic curve crypto-system operations to improve security and performance[J]. Advanced Materials Research, 2012,36(7): 1906-1911.
|
[12] |
杨玉龙, 彭长根, 周洲 等. 基于 Edwards曲线的移动RFID安全认证协议[J]. 通信学报 2014,35(11):133-138. YANG Y L , PENG C G , ZHOU Z et al. Edwards curves based security authentication protocol for mobile RFID systems[J]. Journal on Communications, 2014 35(11):133-138.
|
[13] |
HUO L , JIANG Y L , HU L Q . Research on hash-based low-cost RFID security authentication protocol. Advanced Materials Research, 2013,46(2): 1524-1530.
|
[14] |
LIU Z , LIU D , ZOU X , et al. Design of an elliptic curve cryptography processor for RFID tag chips[J]. Sensors, 2014,14(10): 883-904.
|
[15] |
王潮, 时向勇, 牛志华 . 基于Montgomery曲线改进ECDSA算法的研究[J]. 通信学报 2010,31(1):9-13. WANG C , SHI X Y , NIU Z H . The research of the promotion for ECDSA algorithm based on Montgomery-form ECC[J]. Journal on Communications, 2010 31(1):9-13.
|