References
- F. Klaus, "RFID handbook," Second Edition, Jone Willey & Sons, 2003.
- A. Juels, "RFID security and privacy: a research survey," IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, pp.381-394, Feb. 2006. https://doi.org/10.1109/JSAC.2005.861395
- P. Peris-Lopez, J. C. Hermandez-Castro, J. M. Estevez-Tapaidor, A. Ribagorda, "LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags," Workshop on RFID security 2006(RFIDSec 06), pp.137-148, July 2006.
- P. Peris-Lopez, J. C. Hermandez-Castro, J. M. Estevez-Tapaidor, A. Ribagorda, "M2AP: A Minmalist Mutual-Authentication Protocol for Low-cost RFID tags," Proceedings of UIC 2006, pp.912-923, December 2006.
- P. Peris-Lopez, J. C. Hermandez-Castro, J. M. Estevez-Tapaidor, A. Ribagorda, "EMAP: An Efficient Mutual-Authentication Protocol for Low-cost RFID tags," Proceedings of OTM Federated Conferences and Workshops: IS Workshop 2006. pp.352-361, January 2006.
- S. Kathieyan and M. Nesterenko, "RFID Security without Extensive Cryptography," In Proceedings of the 3rd ACM Workshop on Security of ad-Hoc and Sensor Networks, pp.63-67, 2005.
- P. Golle, M. jakobsson, A. Juels and P. Syverson, "Universal Re-encryption for mixnets," RSA Conference Cryptographers Track 04, LNCS 2964, pp.163-178, 2003.
- M. Feldhofer, S. Dominikus and J. Wolkerstorfer, "Strong Authentication for RFID Systems Using the AES Algorithm," Cryptographic Hardware and Embedded Systems, LNCS 3156, pp.85-140, 2004.
- M. Ohkubo, K. Suzuki and S. Kinoshita "Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID," The Soft Computing and Intelligent Systems (SCIS 2004), pp.719-724, September 2004.
- EPCglobal, "EPCglobal Tag Data Translation (TDT) 1.0 Ratified Standard Specification," pp.1-107, 2006.
- T. Li, R. H. Deng. "Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol," Proceeding of AReS 2007, April 2007.
- T. Li, G. Wang. "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols," Proceeding of IFIP SEC 2007, May 2007.
- 권대성, 이주영, 구본욱, "경량 RFID 상호인증 프로토콜 LMAP, M2AP, EMAP에 대한 향상된 취약성 분석", 정보보호학회논문지, 제17권, 제4호, pp.103-113, 2007
- 최은영, 최동희, 임종인, 이동훈, "저가형 RFID 시스템을 위한 효율적인 인증 프로토콜", 정보보호학회논문지, 제15권, 제5호, 2005
- Shannon, C., "Communication Theory of Secrecy Systems." Bell System Technical Journal, Vol. 28, pp. 656-715, October 1949. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x
- Jiao-Hongqiang, Tian-Junfeng, Wang-Baomin, "A Study on the One-Time Pad Scheme Based Stern-Brocot Tree," ISCSCT 2008, pp.568-571, 2008.
- 오세진, 정경호, 윤태진, 안광선, "일회성 난수를 사용한 RFID 상호인증 프로토콜", 한국통신학회논문지, 제36권, 제7호, pp.858-867, 20011