User menu

Algebraic attacks on RFID protocols

Bibliographic reference van Deursen, T. ; Radomirovic, S.. Algebraic attacks on RFID protocols.Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009 (Brussels, Belgium, 1-4 September 2009). In: Markowitch, O.; Bilas, A.; Hoepman, J.-H.; Mitchell, C.J.; Quisquater, J.-J.;, Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks. Third IFIP WG11.2 International Workshop, WISTP 2009, Springer verlag2009, p. 38-51
Permanent URL http://hdl.handle.net/2078.1/67510
  1. Dolev D., Yao A., On the security of public key protocols, 10.1109/tit.1983.1056650
  2. Lowe G., A hierarchy of authentication specifications, 10.1109/csfw.1997.596782
  3. van Deursen Ton, Mauw Sjouke, Radomirović Saša, Untraceability of RFID Protocols, Lecture Notes in Computer Science (2008) ISBN:9783540799658 p.1-15, 10.1007/978-3-540-79966-5_1
  4. Avoine, G.: Adversary model for radio frequency identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (September 2005)
  5. Juels, A., Weis, S.: Defining strong privacy for RFID. In: IEEE International Conference on Pervasive Computing and Communications – PerCom 2007, New York, USA, pp. 342–347. IEEE Computer Society Press, Los Alamitos (2007)
  6. Vaudenay Serge, On Privacy Models for RFID, Advances in Cryptology – ASIACRYPT 2007 ISBN:9783540768999 p.68-87, 10.1007/978-3-540-76900-2_5
  7. Damgård Ivan, Pedersen Michael Østergaard, RFID Security: Tradeoffs between Security and Efficiency, Topics in Cryptology – CT-RSA 2008 ISBN:9783540792628 p.318-332, 10.1007/978-3-540-79263-5_20
  8. Paise, R.I., Vaudenay, S.: Mutual authentication in RFID: Security and privacy. In: ACM Symposium on Information, Computer and Communications Security (ASIACCS 2008), pp. 292–299. ACM Press, New York (2008)
  9. Chien Hung-Yu, Chen Che-Hao, Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, 10.1016/j.csi.2006.04.004
  10. Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard (2007)
  11. Lee Yong Ki, Batina Lejla, Verbauwhede Ingrid, EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol, 10.1109/rfid.2008.4519370
  12. Bringer Julien, Chabanne Hervé, Icart Thomas, Cryptanalysis of EC-RAC, a RFID Identification Protocol, Cryptology and Network Security (2008) ISBN:9783540896401 p.149-161, 10.1007/978-3-540-89641-8_11
  13. Chien Hung-Yu, Huang Chen-Wei, A Lightweight RFID Protocol Using Substring, Embedded and Ubiquitous Computing ISBN:9783540770916 p.422-431, 10.1007/978-3-540-77092-3_37
  14. Kim Kyoung Hyun, Choi Eun Young, Lee Su Mi, Lee Dong Hoon, Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems, On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (2006) ISBN:9783540482697 p.362-371, 10.1007/11915034_60
  15. Lee, S., Asano, T., Kim, K.: RFID mutual authentication scheme based on synchronized secret information. In: Symposium on Cryptography and Information Security, Hiroshima, Japan (January 2006)
  16. Song Boyeon, Mitchell Chris J., RFID authentication protocol for low-cost tags, 10.1145/1352533.1352556
  17. van Deursen, T., Radomirović, S.: Attacks on RFID protocols (version 1.0). Cryptology ePrint Archive, Report 2008/310 (July 2008), http://eprint.iacr.org/2008/310
  18. Cremers Cas, Mauw Sjouke, Operational Semantics of Security Protocols, Scenarios: Models, Transformations and Tools (2005) ISBN:9783540261896 p.66-89, 10.1007/11495628_4
  19. Fabrega F.J.T., Herzog J.C., Guttman J.D., Strand spaces: why is a security protocol correct?, 10.1109/secpri.1998.674832
  20. Kim Il Jung, Choi Eun Young, Lee Dong Hoon, Secure Mobile RFID system against privacy and security problems, 10.1109/secperu.2007.10
  21. Li Yingjiu, Ding Xuhua, Protecting RFID communications in supply chains, 10.1145/1229285.1229318
  22. Osaka Kyosuke, Takagi Tsuyoshi, Yamazaki Kenichi, Takahashi Osamu, An Efficient and Secure RFID Security Method with Ownership Transfer, Computational Intelligence and Security (2007) ISBN:9783540743767 p.778-787, 10.1007/978-3-540-74377-4_81
  23. Yang, J., Park, J., Lee, H., Ren, K., Kim, K.: Mutual authentication protocol for low-cost RFID. In: Handout of the Ecrypt Workshop on RFID and Lightweight Crypto (July 2005)
  24. Juels Ari, Weis Stephen A., Authenticating Pervasive Devices with Human Protocols, Advances in Cryptology – CRYPTO 2005 (2005) ISBN:9783540281146 p.293-308, 10.1007/11535218_18
  25. Gilbert, H., Robshaw, M., Sibert, H.: An active attack against HB +  – a provably secure lightweight authentication protocol (July 2005) (manuscript)
  26. Di Pietro Roberto, Molva Refik, Information Confinement, Privacy, and Security in RFID Systems, Computer Security – ESORICS 2007 (2007) ISBN:9783540748342 p.187-202, 10.1007/978-3-540-74835-9_13
  27. Peris-Lopez Pedro, Hernandez-Castro Julio Cesar, Estevez-Tapiador Juan M., Ribagorda Arturo, M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags, Ubiquitous Intelligence and Computing (2006) ISBN:9783540380917 p.912-923, 10.1007/11833529_93
  28. Peris-Lopez Pedro, Hernandez-Castro Julio Cesar, Estevez-Tapiador Juan M., Ribagorda Arturo, EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags, On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (2006) ISBN:9783540482697 p.352-361, 10.1007/11915034_59
  29. Peris-Lopez, P., Castro, J.C.H., Estévez-Tapiador, J.M., Ribagorda, A.: LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In: Printed handout of Workshop on RFID Security – RFIDSec 2006 (July 2006)
  30. Alomair Basel, Lazos Loukas, Poovendran Radha, Passive Attacks on a Class of Authentication Protocols for RFID, Lecture Notes in Computer Science ISBN:9783540767879 p.102-115, 10.1007/978-3-540-76788-6_9
  31. Li Ticyan, Wang Guilin, Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols, New Approaches for Security, Privacy and Trust in Complex Environments (2007) ISBN:9780387723662 p.109-120, 10.1007/978-0-387-72367-9_10
  32. Vajda, I., Buttyán, L.: Lightweight authentication protocols for low-cost RFID tags. In: Second Workshop on Security in Ubiquitous Computing – Ubicomp 2003, Seattle, WA, USA (October 2003)
  33. Kang Jeonil, Nyang DaeHun, RFID Authentication Protocol with Strong Resistance Against Traceability and Denial of Service Attacks, Security and Privacy in Ad-hoc and Sensor Networks (2005) ISBN:9783540309123 p.164-175, 10.1007/11601494_14