RFID-Tags for Anti-counterfeiting
Top Cited Papers
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 115-131
- https://doi.org/10.1007/11605805_8
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy DataLecture Notes in Computer Science, 2004
- Security Proofs for Identity-Based Identification and Signature SchemesLecture Notes in Computer Science, 2004
- Controlled physical random functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric TemplatesLecture Notes in Computer Science, 2003
- The Montgomery Powering LadderLecture Notes in Computer Science, 2003
- Strong Key-Insulated Signature SchemesLecture Notes in Computer Science, 2002
- Selecting Cryptographic Key SizesLecture Notes in Computer Science, 2000
- Elliptic Curves in CryptographyPublished by Cambridge University Press (CUP) ,1999
- Fast Multiplication on Elliptic Curves Over GF(2m) without precomputationLecture Notes in Computer Science, 1999
- Algorithm engineering for public key algorithmsIEEE Journal on Selected Areas in Communications, 1989