1 |
Sarma S E . Towards the 5 Cent Tag. Technical Report.MIT-AUTOID-WH-006,MIT-AUTOID Center, 2001
|
2 |
Weis S A , Sarma S E , Rivest R L ,et al. Security and privacy aspects of low-cost radio frequency identification systems. Proceedings of First International Conference on Security in Pervasive Computing, Boppard,Germany, 2003:201~212
|
3 |
Avoine G , Oechslin P . A scalable and provably secure hash based RFID protocol. Proceedings of the 2nd IEEE International Workshop on Pervasive Computing and Communication Security, Kauai Island,Hawaii,USA, 2005
|
4 |
Feldhofer M , Dominikus S , Wolkerstorfer J . Strong authentication for RFID systems using the AES algorithm. Proceedings of Cryptographic Hardware and Embedded Systems-CHES'04, Santa Barbara,CA,USA, 2004:357~370
|
5 |
Gaubatz G , Kaps J P , Ozturk E . State of the art in ultra-low power public key cryptography for wireless sensor networks. Proceedings of the 3rd Int'l Conference on Pervasive Computing and Communications Workshops(PerCom 2005 Workshops), 2005:146~150
|
6 |
Yeh T C , Wu C H , Tseng Y M . Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications, 2010(5)
|
7 |
Chen Y L , Chou J S , Sun H M . A novel mutual authentication scheme based on quadratic residues for RFID systems. Computer Networks, 2008,52(12): 2373~2380
|
8 |
Braun M , Hess E , Meyer B . Using elliptic curves on RFID tags. International Journal of Computer Science and Network Security IJCSNS, 2008(2)
|
9 |
Kumar S S , Paar C . Are standards compliant elliptic curve cryptosystems feasible on RFID. Proceedings of Workshop RFID Security, Graz,Austria, 2006
|
10 |
F‥urbass F , Wolkerstorfer J . ECC processor with low die size for RFID applications. Circuits and Systems, New Orleans,LA,USA, 2007: 1835~1838
|
11 |
Batina1L , Seys S , Singelˊee D ,et al. Hierarchical ECC-based RFID authentication protocol. RFIDSec 2011, Amherst,Massachusetts,USA, 2012: 183~201
|
12 |
Batina L , Lee Y K , Seys S ,et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Personal and Ubiquitous Computing, 2012(3)
|
13 |
Girault M . Self-certified public keys. Proceedings of Eurocrypt'91, Brighton,UK, 1992: 490~497
|
14 |
ISO/IEC. International Standard ISO/IEC 9798 Part 5:Mechanisms Using Zero-Knowledge Techniques, 2004
|
15 |
McLoone M , Robshaw M J B . Public key cryptography and RFID tags. Proceedings of the 7th Cryptographers' Track at the RSA Conference on Topics in Cryptology, San Francisco,CA,USA, 2007: 372~384
|
16 |
Poschmann A , Robshaw M J B , Vater F ,et al. Lightweight cryptography and RFID:tackling the hidden overhead. TIIS, 2010(2)
|
17 |
OˊNeill M , Robshaw M O N N . Low-cost digital signature architecture suitable for RFID tags. IET Computers & Digital Techniques, 2010(1)
|
18 |
McLoone M , Robshaw M J B . New architectures for low-cost public key cryptography on RFID tags. Proceedings of 2007 ISCAS, New Orleans,LA,USA, 2007
|
19 |
Rabin M O . Digitalized Signatures and Public Key Functions as Intractable as Factorization. MIT/LCS/TR-212, Mas-sachusetts Institute of Technology, 1979
|
20 |
Hell M , Johansson T , Meier W . Grain-a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2007(1)
|