2009
DOI: 10.1007/978-3-642-05445-7_12
|View full text |Cite
|
Sign up to set email alerts
|

More on the Security of Linear RFID Authentication Protocols

Abstract: Abstract. The limited computational resources available in RFID tags implied an intensive search for lightweight authentication protocols in the last years. The most promising suggestions were those of the HBfamiliy (HB + , HB # , TrustedHB, ...) initially introduced by Juels and Weis, which are provably secure (via reduction to the Learning Parity with Noise (LPN) problem) against passive and some kinds of active attacks. Their main drawbacks are large amounts of communicated bits and the fact that all known … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
8
0

Year Published

2009
2009
2013
2013

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The principle of random selection underlies, e.g., the CKK-protocols of Cichoń, Klonowski, and Kuty lowski [7] as well as the F f -protocols in [3] and the Linear Protocols in [18]. It can be described as follows.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…The principle of random selection underlies, e.g., the CKK-protocols of Cichoń, Klonowski, and Kuty lowski [7] as well as the F f -protocols in [3] and the Linear Protocols in [18]. It can be described as follows.…”
Section: Introductionmentioning
confidence: 99%
“…Note that the protocols introduced in [7], [3], and [18] are based on random selection of GF (2)-linear functions. The choice of linear basis functions is motivated by the fact that they can be implemented efficiently in hardware and have desirable pseudo-random properties with respect to a wide range of important statistical tests.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations