2007 IEEE International Symposium on Circuits and Systems (ISCAS) 2007
DOI: 10.1109/iscas.2007.378272
|View full text |Cite
|
Sign up to set email alerts
|

Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2008
2008
2011
2011

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 80 publications
(46 citation statements)
references
References 5 publications
0
46
0
Order By: Relevance
“…However, these results come from stand-alone type of design. Although our unified SHA hardware is a little bit larger than the design of [8][9][10], it has an advantage of supporting SHA-1 and SHA-256 hash function on a single data path.…”
Section: Implementation Resultsmentioning
confidence: 99%
“…However, these results come from stand-alone type of design. Although our unified SHA hardware is a little bit larger than the design of [8][9][10], it has an advantage of supporting SHA-1 and SHA-256 hash function on a single data path.…”
Section: Implementation Resultsmentioning
confidence: 99%
“…In particular, we note that the requirements are sufficiently low also for contemporary smart card technologies, because AES-128 and SHA-256 require only about 3,400 and 11,000 gates, respectively [FW07]. As our protocol requires no public-key operations on the token, small smart cards are sufficient.…”
Section: Entitymentioning
confidence: 93%
“…To let tags know an ID of a reader, the authors use a symmetric encryption (Feldhofer & Wolkerstorfer, 2007). By decrypting a received message with its own identifier, a tag can know an ID of a reader.…”
Section: Protocol 4 In Pmentioning
confidence: 99%