找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: RFIDSecurity and Privacy; 7th International Wo Ari Juels,Christof Paar Conference proceedings 2012 Springer-Verlag GmbH Berlin Heidelberg 2

[復制鏈接]
樓主: 深謀遠慮
31#
發(fā)表于 2025-3-26 22:42:30 | 只看該作者
https://doi.org/10.1007/978-3-642-25286-0authentication; contactless smartcards; elliptic curves; lightweight cryptography; public-key cryptograp
32#
發(fā)表于 2025-3-27 02:48:40 | 只看該作者
33#
發(fā)表于 2025-3-27 06:32:42 | 只看該作者
KLEIN: A New Family of Lightweight Block Ciphers,es. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to
34#
發(fā)表于 2025-3-27 13:20:17 | 只看該作者
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm,tion tag for each message processed. Like it’s predecessor Hummingbird-1, Hummingbird-2 has been targeted for low-end microcontrollers and for hardware implementation in lightweight devices such as RFID tags and wireless sensors. Compared to the previous version of the cipher, and in response to ext
35#
發(fā)表于 2025-3-27 14:22:24 | 只看該作者
Elliptic Curve Cryptography on the WISP UHF RFID Tag,ical results of an implementation of elliptic curve cryptography (ECC) running on the WISP. Our implementation is based on the smallest recommended NIST elliptic curve over prime fields. We meet the low-resource requirements of the platform by various code-size and memory optimizations. Furthermore,
36#
發(fā)表于 2025-3-27 18:10:54 | 只看該作者
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Estandard cryptographic primitives within the very limited circuit and power budget of RFID devices. On the other hand, such cryptographic implementations raise concerns regarding their vulnerability to both active and passive side channel attacks. In particular, when focusing on RFID targeted design
37#
發(fā)表于 2025-3-28 01:11:30 | 只看該作者
38#
發(fā)表于 2025-3-28 04:12:14 | 只看該作者
39#
發(fā)表于 2025-3-28 09:28:53 | 只看該作者
Security Analysis of Two Distance-Bounding Protocols,how that the claimed security of both protocols has been overestimated. Namely, we show that the Hitomi protocol is susceptible to a full secret key disclosure attack which not only results in violating the privacy of the protocol but also can be exploited for further attacks such as impersonation,
40#
發(fā)表于 2025-3-28 11:39:23 | 只看該作者
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFID,ing between a passive RFID tag and a reader. Most pairing protocols rely for their security on a certain advantage that the legitimate devices have over any malicious users. Such advantages include proximity (employing near-field communication) or secret keys that are either produced with the assist
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 07:04
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
双峰县| 阳西县| 关岭| 淮南市| 武汉市| 贞丰县| 泾川县| 十堰市| 漾濞| 香格里拉县| 中山市| 吐鲁番市| 调兵山市| 全州县| 沁源县| 大埔县| 永春县| 吴忠市| 长泰县| 澳门| 金湖县| 辽中县| 丽江市| 乌兰察布市| 镶黄旗| 丹凤县| 蒙阴县| 龙里县| 祁门县| 康定县| 遵化市| 郧西县| 婺源县| 双流县| 青海省| 太康县| 敦煌市| 边坝县| 正定县| 商南县| 察雅县|