Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID Devices
- 22 August 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Energy Comparison of AES and SHA-1 for Ubiquitous ComputingLecture Notes in Computer Science, 2006
- Design and Implementation of Low-Area and Low-Power AES Encryption Hardware CorePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- AES implementation on a grain of sandIEE Proceedings - Information Security, 2005
- Strong Authentication for RFID Systems Using the AES AlgorithmPublished by Springer Science and Business Media LLC ,2004
- The EM Side—Channel(s)Lecture Notes in Computer Science, 2003
- Electromagnetic Analysis: Concrete ResultsLecture Notes in Computer Science, 2001
- ElectroMagnetic Analysis (EMA): Measures and Counter-measures for Smart CardsLecture Notes in Computer Science, 2001
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996
- Elliptic Curve CryptosystemsMathematics of Computation, 1987