2008 12th IEEE International Workshop on Future Trends of Distributed Computing Systems 2008
DOI: 10.1109/ftdcs.2008.20
|View full text |Cite
|
Sign up to set email alerts
|

ERAP: ECC Based RFID Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(17 citation statements)
references
References 6 publications
0
17
0
Order By: Relevance
“…Batina et al evaluated in [5] ECC for the usage in RFID-based identification protocols and demonstrated a feasible implementation. Further ECC-based protocols that targeted resource constrained applications were presented, for example, by the authors in [6] and [7]. In [8], the authors introduced an ECC-based authentication protocol that is particularly suitable for resource constrained embedded systems, such as contactlessly powered RFID tags.…”
Section: Related Workmentioning
confidence: 99%
“…Batina et al evaluated in [5] ECC for the usage in RFID-based identification protocols and demonstrated a feasible implementation. Further ECC-based protocols that targeted resource constrained applications were presented, for example, by the authors in [6] and [7]. In [8], the authors introduced an ECC-based authentication protocol that is particularly suitable for resource constrained embedded systems, such as contactlessly powered RFID tags.…”
Section: Related Workmentioning
confidence: 99%
“…The ProveTag algorithm and the VerifyTag algorithm is defined in [7]. The ProveReader and the VerifyReader algorithms are the very same as the Tag's ones except that in this processes the secret key of the Reader should be used.…”
Section: ) Knowledge Of the Reader And The Tagmentioning
confidence: 99%
“…The ERAP (ECC Based RFID Authentication Protocol) is proposed in [7]. As a matter of fact the ERAP Protocol bases on in a small compass modified ECDSA signing scheme.…”
Section: B the Erap Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…This is insufficient for standard cryptographic techniques such as RSA [6]. Although cheaper cryptographic alternatives such as Elliptic Curve Cryptography (ECC) exist and authentication schemes such as ERAP [7] based on ECC have been proposed for RFID systems, the practical implementation of ECC is still an open research problem. As demonstrated by Batina et al [8], implementation of ECC would require between 8.2k and 15k equivalent gates.…”
Section: Introductionmentioning
confidence: 99%