Hardware Implementation of Symmetric Algorithms for RFID Security
- 1 January 2008
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Power and EM Attacks on Passive $13.56\,\textrm{MHz}$ RFID DevicesLecture Notes in Computer Science, 2007
- Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware ImplementationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- A Lightweight RFID Protocol to protect against Traceability and Cloning attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Efficient RFID Authentication Protocol for Ubiquitous Computing EnvironmentLecture Notes in Computer Science, 2005
- AES implementation on a grain of sandIEE Proceedings - Information Security, 2005
- ASIC implementation of a unified hardware architecture for non-key based cryptographic hash primitivesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Strong Authentication for RFID Systems Using the AES AlgorithmPublished by Springer Science and Business Media LLC ,2004
- A hardware implementation of MD4-family hash algorithmsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003