2014
DOI: 10.1007/978-3-319-13066-8_1
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 34 publications
0
16
0
Order By: Relevance
“…Applications. Take the application of passive RFID tags for example, Simeck should satisfy the following requirements in order to be used in practice: 1) The area of Simeck should be less than 2000 GEs [18,2].…”
Section: Introductionmentioning
confidence: 99%
“…Applications. Take the application of passive RFID tags for example, Simeck should satisfy the following requirements in order to be used in practice: 1) The area of Simeck should be less than 2000 GEs [18,2].…”
Section: Introductionmentioning
confidence: 99%
“…We note that there exist an implementation of Trivium [32] using dynamic logic which requires only 749 GEs. However the lower bound on the clock frequency of this implementation is 1 MHz, which is not achievable in restricted devices [4].…”
Section: Implementation Resultsmentioning
confidence: 96%
“…The reason is twofold here. First, storing a fixed value does not require any volatile memory such as flip-flops and can be simply realized by burning it into the device using for example fuses (see [4] for more discussions). Second, other lightweight stream ciphers would, if used on restricted devices such as RFID, likewise require to store the key in non-volatile memory so that when the device is restarted the cipher has to be initialized with the original key.…”
Section: Implementation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…[14][15][16][17][18]. Multiple issues have been raised about the feasibility of implementing HB-based protocols for ultraconstrained devices [19]. In this work, we design a novel distance-bounding/authentication protocol based on HB + that is feasible in constrained environments (RFID tags).…”
Section: Introductionmentioning
confidence: 98%