User menu

Coupon recalculation for the GPS authentication scheme

Bibliographic reference Hofferek, Georg ; Wolkerstorfer, Johannes. Coupon recalculation for the GPS authentication scheme.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 162-175
Permanent URL
  1. ADT Tyco Fire & Security, Alien Technology, Impinj Inc., Intel Corporation, Symbol Technologies, and Xterprise. RFID and UHF – A Prescription for RFID Success in the Pharmaceutical Industry. White paper (2006)
  2. Austriamicrosystems. 0.35μm CMOS Process Standard-Cell Library,
  3. Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Koren, Kornerup (eds.) Proceedings of the 14th IEEE Symposium on Computer Arithmetic, Adelaide, Australia, pp. 70–77. IEEE Computer Society Press, Los Alamitos (1999)
  4. Feldhofer M., Wolkerstorfer J., Rijmen V., AES implementation on a grain of sand, 10.1049/ip-ifs:20055006
  5. Girault Marc, An identity-based identification scheme based on discrete logarithms modulo a composite number, Advances in Cryptology — EUROCRYPT ’90 (1991) ISBN:9783540535874 p.481-486, 10.1007/3-540-46877-3_44
  6. Girault Marc, Self-certified public keys, Advances in Cryptology — EUROCRYPT ’91 ISBN:9783540546207 p.490-497, 10.1007/3-540-46416-6_42
  7. Girault, M.: Low-size coupons for low-cost ic cards. In Smart Card Research and Advanced Applications. In: Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, CARDIS 2000, Bristol, UK, September 20-22, 2000, vol. 180, pp. 39–50. Kluwer, Dordrecht (2000)
  8. Girault Marc, Lefranc David, Public Key Authentication with One (Online) Single Addition, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.413-427, 10.1007/978-3-540-28632-5_30
  9. Girault Marc, Poupard Guillaume, Stern Jacques, On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order, 10.1007/s00145-006-0224-0
  10. ISO/IEC. International Standard ISO/IEC 9798 Part 5: Mechanisms using zero-knowledge techniques (December 2004)
  11. Kaya Koc C., Acar T., Kaliski B.S., Analyzing and comparing Montgomery multiplication algorithms, 10.1109/40.502403
  12. McLoone, M., Robshaw, M.: Public key cryptography and RFID tags. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377. Springer, Heidelberg (2006)
  13. McLoone M., Robshaw M.J.B., New Architectures for Low-Cost Public Key Cryptography on RFID Tags, 10.1109/iscas.2007.378269
  14. Montgomery Peter L., Modular multiplication without trial division, 10.1090/s0025-5718-1985-0777282-x
  15. NESSIE. Final report of European project number IST-1999-12324, named new european schemes for signatures, integrity, and encryption (April 2004),
  16. Tuyls Pim, Batina Lejla, RFID-Tags for Anti-counterfeiting, Topics in Cryptology – CT-RSA 2006 (2006) ISBN:9783540310334 p.115-131, 10.1007/11605805_8
  17. UMC. UMC standard cell library — 130 nm CMOS process
  18. UMC. UMC standard cell library — 250 nm CMOS process
  19. Wolkerstorfer, J.: Is Elliptic-Curve Cryptography Suitable for Small Devices? In: Workshop on RFID and Lightweight Crypto, Graz, Austria, July 13-15, 2005, pp. 78–91 (2005)