Hash Functions and RFID Tags: Mind the Gap
- 5 August 2008
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 28 references indexed in Scilit:
- PRESENT: An Ultra-Lightweight Block CipherLecture Notes in Computer Science, 2006
- A Lightweight RFID Protocol to protect against Traceability and Cloning attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Some Plausible Constructions of Double-Block-Length Hash FunctionsLecture Notes in Computer Science, 2006
- A Case Against Currently Used Hash Functions in RFID ProtocolsLecture Notes in Computer Science, 2006
- LOKI — A cryptographic primitive for authentication and secrecy applicationsPublished by Springer Science and Business Media LLC ,2005
- Provably Secure Double-Block-Length Hash Functions in a Black-Box ModelLecture Notes in Computer Science, 2005
- Strong Authentication for RFID Systems Using the AES AlgorithmPublished by Springer Science and Business Media LLC ,2004
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGVLecture Notes in Computer Science, 2002
- A Design Principle for Hash FunctionsPublished by Springer Science and Business Media LLC ,2001
- Analysis of SHA-1 in Encryption ModeLecture Notes in Computer Science, 2001