“…Our attacks do not even need the strong requirement of corrupting tags [26,13,27,17,16,28,22]. To the best of our knowledge, attacks presented here are the first known analyses of ProbIP [8], MARP [14], Auth2 [24], YA-TRAP+ [4], O-TRAP [4] and RIPP-FS [9].…”