2013
DOI: 10.1007/978-3-642-38530-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Protocol for Low-Cost RFID Tags

Abstract: Abstract. Providing security in low-cost RFID (Radio Frequency Identification) tag systems is a challenging task because low-cost tags cannot support strong cryptography which needs costly resources. Special lightweight algorithms and protocols need to be designed to take into account the tag constraints. In this paper, we propose a function and a protocol to ensure pre-shared key authentication.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…With respect to the Dusart-Traoré primitive, we answer the question above via contributions in Section 3. More specifically, we first demonstrate an efficient structural attack in Section 3.2, then, in Section 3.3, algebraic attacks that give a far more precise security estimate regarding the feasibility of such attacks against the primitive than the claims in [12]. In Section 3.4.3 we debunk the claim made in [36] of having broken the Dusart-Traoré primitive; in fact we demonstrate that the attack in [36] is not an attack at all.…”
Section: Introductionmentioning
confidence: 94%
See 4 more Smart Citations
“…With respect to the Dusart-Traoré primitive, we answer the question above via contributions in Section 3. More specifically, we first demonstrate an efficient structural attack in Section 3.2, then, in Section 3.3, algebraic attacks that give a far more precise security estimate regarding the feasibility of such attacks against the primitive than the claims in [12]. In Section 3.4.3 we debunk the claim made in [36] of having broken the Dusart-Traoré primitive; in fact we demonstrate that the attack in [36] is not an attack at all.…”
Section: Introductionmentioning
confidence: 94%
“…This Section describes the authentication protocol and supporting primitive presented in [12,Sections 4 and 5]; for clarity we adopt the same notation, with specific additions introduced where required.…”
Section: Background and Notationmentioning
confidence: 99%
See 3 more Smart Citations