2010 IEEE International Conference on RFID (IEEE RFID 2010) 2010
DOI: 10.1109/rfid.2010.5467258
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 15 publications
0
17
0
Order By: Relevance
“…A number of distance bounding protocols were proposed in recent years [2], [4], [5], [12], [14], [15], [19]- [21], [23], [24], [27]- [29]. The proposed protocols differ in terms of the performance and security guarantees that they provide.…”
Section: Introductionmentioning
confidence: 99%
“…A number of distance bounding protocols were proposed in recent years [2], [4], [5], [12], [14], [15], [19]- [21], [23], [24], [27]- [29]. The proposed protocols differ in terms of the performance and security guarantees that they provide.…”
Section: Introductionmentioning
confidence: 99%
“…There are four direct descendants of Brands and Chaum's protocol: [20,42,59,63], each of which improved Brands and Chaum in its own way. Peris-Lopez et al [59] propose that cryptographic puzzles should be used to provide privacy in distance-bounding protocols. Rasmussen andČapkun protocol [63] is based on XOR and a comparison function, and has the benefit that the prover does not need to demodulate the signal to answer to the verifier's challenges.…”
Section: Protocol Evolutionmentioning
confidence: 99%
“…A preliminary version of our protocol can be found in [66]. In this article, the protocol specification is enhanced and further analyzed in terms of the computational overheads and security properties achieved.…”
Section: Distance-bounding Protocolsmentioning
confidence: 99%