References
- S. A. Weis, S. E. Sarma, R. Rivest, and D. W. Engels, "Security and privacy aspects of low-cost radio frequency identification systems," in Proc. 1st Security Pervasive Comput., 2003, vol. 2802, Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, pp. 201-212 https://doi.org/10.1007/978-3-540-39881-3_18
- P. Ekdahl, and T. Johansson, "Another attack on A5/l ", IEEE Transactions on Information Theory, V.49, N.1, pp.284-289, 2003 https://doi.org/10.1109/TIT.2002.806129
- I. Vajda and L. Buttyan, "Lightweight authentication protocols for low cost RFID tags," in Proc, 2nd Workshop on Security in Ubiquitous Computer, 2003, pp.76-82
- M. Feldhofer, etcs, "Strong authentication for RFID systems using the AES algorithm," Cryptographic hardware and embedded systems", CHES 2004, v.3156, pp.357-370, 2004 https://doi.org/10.1007/978-3-540-28632-5_26
- Martin Feldhofer, "Strong crypto for RFID Tag, A comparison of low power hardware implementation", 2007 IEEE, pp.1839-1842 https://doi.org/10.1109/ISCAS.2007.378272
- Mangard,S, et aI, "Power analyses attacks-revealing the secrets of smartcards", Springer-ISBN: 0-38730857-1,2007
- G.Gaubatz, et.al, "Public key Cryptography in sensor network", 1st European workshop on security in Ad Hoc and sensor networks", ESAS 2004, Aug.2004
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. W orkshopCryptographic Hardware Embedded Syst. (CHES 2004), Lecture Notes in Computer Science. Berlin, Germany: Springer-Verlag, vol. 3156, pp. 357-370 https://doi.org/10.1007/978-3-540-28632-5_26
- Yong Ki Lee, etcs, "Elliptic Curve Based Security Processor for RFID", IEEE Transactions on Computers, v.57. n.ll, pp. 1514-1526, NOV. 2008 https://doi.org/10.1109/TC.2008.148
- Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
- Pieer E, etcs, "A Fast Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications", The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies, pp.33.-38, 2007
- Andrey B,etcs, "Hash functions and RFID tags: Mind the Gap:, CHES 2008, LNCS, pp.283-299, 2008 https://doi.org/10.1007/978-3-540-85053-3_18