找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: RFIDSecurity and Privacy; 7th International Wo Ari Juels,Christof Paar Conference proceedings 2012 Springer-Verlag GmbH Berlin Heidelberg 2

[复制链接]
楼主: 深谋远虑
发表于 2025-3-26 22:42:30 | 显示全部楼层
https://doi.org/10.1007/978-3-642-25286-0authentication; contactless smartcards; elliptic curves; lightweight cryptography; public-key cryptograp
发表于 2025-3-27 02:48:40 | 显示全部楼层
发表于 2025-3-27 06:32:42 | 显示全部楼层
KLEIN: A New Family of Lightweight Block Ciphers,es. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to
发表于 2025-3-27 13:20:17 | 显示全部楼层
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm,tion tag for each message processed. Like it’s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the previous version of the cipher, and in response to ext
发表于 2025-3-27 14:22:24 | 显示全部楼层
Elliptic Curve Cryptography on the WISP UHF RFID Tag,ical results of an implementation of elliptic curve cryptography (ECC) running on the WISP. Our implementation is based on the smallest recommended NIST elliptic curve over prime fields. We meet the low-resource requirements of the platform by various code-size and memory optimizations. Furthermore,
发表于 2025-3-27 18:10:54 | 显示全部楼层
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Estandard cryptographic primitives within the very limited circuit and power budget of RFID devices. On the other hand, such cryptographic implementations raise concerns regarding their vulnerability to both active and passive side channel attacks. In particular, when focusing on RFID targeted design
发表于 2025-3-28 01:11:30 | 显示全部楼层
发表于 2025-3-28 04:12:14 | 显示全部楼层
发表于 2025-3-28 09:28:53 | 显示全部楼层
Security Analysis of Two Distance-Bounding Protocols,how that the claimed security of both protocols has been overestimated. Namely, we show that the Hitomi protocol is susceptible to a full secret key disclosure attack which not only results in violating the privacy of the protocol but also can be exploited for further attacks such as impersonation,
发表于 2025-3-28 11:39:23 | 显示全部楼层
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID,ing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the legitimate devices have over any malicious users. Such advantages include proximity (employing near-field communication) or secret keys that are either produced with the assist
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-9 21:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表