References
- W.W. Adams and P. Loustaunau, "An Introduction to Grobner Bases," Graduate Studies in Mathematics, Vol.3, AMS, 1994.
- B. Alomair, L. Lazos, and R. Poovendran, "Passive Attacks on a Class of Authentication Protocols for RFID," Proceedings of ICISC 2007, LNCS 4817, Springer-Verlag, 2007, pp.102-115.
- G. Avoine, Cryptography in Radio Frequency Identification and Fair Exchange Protocols [dissertation]. Lausanne, Switzerland: EPFL; 2005.
- M. Brickenstein, A. Dreyer, PolyBoRi: "A Framework for Grobner Basis Computations with Boolean Polynomials," Electronic Proceedings of the MEGA 2007 - Efficient Methods in Algebraic Geometry, Strobl, Austria, 2007.
- J. Buchmann, A. Pyshkin, and R-P Weinmann, "Block Ciphers Sensitive to Grobner Basis Attacks," Proceedings of CT-RSA 2006, LNCS 3860, Springer-Verlag, 2006, pp.313-331.
- T. Cao, L. Bertino, and H. Lei, "Security Analysis of the SASI Protocol," IEEE Transactions on Dependable and Secure Computing, Vol.6, No.1, 2009, pp.73-77. https://doi.org/10.1109/TDSC.2008.32
- H.-Y. Chien, "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication ans Strong Integrity," IEEE Transactions on Dependable and Secure Computing, Vol.4, No.4, 2007, pp.337-340. https://doi.org/10.1109/TDSC.2007.70226
- C. Cid, S. Murphy, and M. Robshaw, Algebraic Aspects of the Advanced Encrpytion Standard, Springer-Verlag, 2006.
- N. Courtois, and J. Pieprzyk, "Cryptanalysis of Block Ciphers with Over-defined System of Equations," Proceedings of Asiacrypt 2002, LNCS 2501, Springer-Verlag, 2002, pp.267-287.
- N. Courtois, "Fast Algebraic Attacks on Stream Ciphers with Linear Feedback," Proceedings of Crypto 2003, LNCS 2729, Springer-Verlag, 2003, pp.176-194.
- N. Courtois and W. Meier, "Algebraic Attacks on Stream Ciphers with Linear Feedback," Proceedings of Eurocrypt 2003, LNCS 2656, Springer-Verlag, 2003, pp.345-359.
- J.-C. Faugere, "A New Efficient Algorithm for computing Grobner bases (F4)," Journal of Pure and Applied Algebra, Vol.139, 1999, pp.61-88. https://doi.org/10.1016/S0022-4049(99)00005-5
- J.-C. Faugere, "A New Efficient Algorithm for computing Grobner bases without Reduction to Zero (F5)," Proceedings of ISSAC 2002, pp.75-83.
- J.-C. Faugere, and A. Joux, "Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems using Grobner bases," Proceedings of Crypto 2003, LNCS 2729, Springer-Verlag, 2003, pp.44-60.
- M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using AES Algorithm," Proceedings of CHES 2004, LNCS 3156, Springer-Verlag, 2004, pp.357-370.
- M. Feldhofer and C. Rechberger, "A Case against Currently Used Hash Functions in RFID Protocols," Proceedings of RFIDSec 2006.
- C. Hung-Yu and H. Chen-Wei, "Security of ultra-lightweight RFID authentication protocols and its improvements," ACM SIGOPS Operating Systems Review, Vol.41, No.4, 2007, pp.83-86. https://doi.org/10.1145/1278901.1278916
- A. Juels, "RFID Security and Privacy: A Research Survey," IEEE Journal on Selected Areas in Communications, Vol.24, No.2, 2006, pp.381-394. https://doi.org/10.1109/JSAC.2005.861395
- A. Juels, R. Rivest and M. Szydlo, "The Blocker tag: Selective Blocking of RFID Tags for Consumer Privacy," Proceedings of CCS 2003, ACM Press, 2003, pp.103-111.
- A. Juels and S. A. Weis, "Authenticating Pervasive Devices with Human Protocols," Proceedings of Crypto'05, LNCS 3621, Springer-Verlag, 2005, pp.293-308.
- Y.-C. Lee, Y.-C. Hsieh, P.-S. You, T.-C. Chen, "A New Ultralightweight RFID Protocol with Mutual Authentication," Proceedings of WASE 2009, Vol.2 of ICIE, 2009, pp.58-61.
- N.-W. Lo, H.-S. Shie, K.-H. Yeh, "A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations," Proceedings of JWIS 2008.
- P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags" Proceedings of UIC 2006, LNCS 4159, Springer-Verlag, 2006, pp.912-923.
-
P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "
$M^2AP$ : A Minimalist Mutual-Authentication Protocol for Low-cost RFID tags" Proceedings of UIC 2006, LNCS 4159, Springer-Verlag, 2006, pp.912-923. - P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-cost RFID tags," Proceedings of IS 2006, LNCS 4277, Springer-Verlag, 2006, pp.352-361.
- R. C.-W. Phan, "Cryptanalysis of a New Ultralightweight RFID Authentication Protocol-SASI," IEEE Transactions on Dependable and Secure Computing, Vol.6, No.4, 2009, pp.316-320. https://doi.org/10.1109/TDSC.2008.33
- Sage distribution of mathematical software, http://www.sagemath.org
- S. A. Weis, Security and Privacy in Radio-Frequency Identification Devices [dissertation]. Massachusetts: Massachusetts Institute of Technology (MIT); 2003.
Cited by
- Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol vol.27, pp.02, 2018, https://doi.org/10.1142/S0218126618500330
- RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash vol.11, pp.1, 2015, https://doi.org/10.1155/2015/642180
- A New Ultralightweight RFID Authentication Protocol for Passive Low Cost Tags: KMAP vol.94, pp.3, 2017, https://doi.org/10.1007/s11277-016-3647-4
- Pitfalls in Ultralightweight Authentication Protocol Designs vol.15, pp.9, 2016, https://doi.org/10.1109/TMC.2015.2492553
- Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols vol.8, pp.7, 2013, https://doi.org/10.1109/TIFS.2013.2263499
- A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash vol.12, pp.2, 2016, https://doi.org/10.1155/2016/9648971