2009
DOI: 10.1007/978-3-642-10628-6_21
|View full text |Cite
|
Sign up to set email alerts
|

Two Attacks against the F f RFID Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Unfortunately, the authors of [14] found the connections between the F f protocol and the LPN problem, and showed a key-recovery attack with time complexity of about 2 38 against the instance equipped with a 512-bit secret key. Nevertheless, this design philosophy deserves further investigation as it exhibits a promising way to achieve necessary security by customizing the underlying cryptographic primitives.…”
Section: Epc Gen2mentioning
confidence: 99%
“…Unfortunately, the authors of [14] found the connections between the F f protocol and the LPN problem, and showed a key-recovery attack with time complexity of about 2 38 against the instance equipped with a 512-bit secret key. Nevertheless, this design philosophy deserves further investigation as it exhibits a promising way to achieve necessary security by customizing the underlying cryptographic primitives.…”
Section: Epc Gen2mentioning
confidence: 99%