Cryptanalysis of SIMON Variants with Connections
Alizadeh, Javad, Alkhzaimi, Hoda A., Aref, Mohammad Reza, Bagheri, Nasour, Gauravaram, Praveen, Kumar, Abhishek, Lauridsen, Martin M., Sanadhya, Somitra Kumar
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter
Privacy-Preserving Authorized RFID Authentication Protocols
Li, Nan, Mu, Yi, Susilo, Willy, Guo, Fuchun, Varadharajan, Vijay
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter
Non-Linear Collision Analysis
Ye, Xin, Chen, Cong, Eisenbarth, Thomas
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter
A Low Area Probing Detector for Power Efficient Security ICs
Weiner, Michael, Manich, Salvador, Sigl, Georg
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter
ePassport: Side Channel in the Basic Access Control
Sportiello, Luigi
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter
Curved Tags -- A Low-Resource ECDSA Implementation Tailored for RFID
Pessl, Peter, Hutter, Michael
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Published in Radio Frequency Identification: Security and Privacy Issues (01.01.2014)
Get full text
Book Chapter