Abstract. With continuous improvements in the efficiency of microelectronics, it is now possible to power a general-purpose microcontroller wirelessly at a reasonable range. Our implementation of RC5-32/12/16 on the WISP UHF RFID tag shows that conventional cryptography is no longer beyond the reach of a general-purpose UHF tag. In this paper, (1) we provide preliminary experimental data on how much computation is available on a TI MSP430F1232 microcontroller-based RFID tag containing approximately 8 KBytes of flash and 256 bytes of RAM, and (2) we show that symmetric cryptography is feasible on an RF-powered, general-purpose RFID tag — providing the first implementation of conventional cryptography on an RF-powered UHF RFID tag as far as w...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
This paper presents a security-enhanced baseband system for UH R ID tag, which is based on ISO1 000-...
RFID is a technology that allows identification and authentication of objects or persons through the...
Abstract Passive radio-frequency identification (RFID) tags have long been thought to be too weak to...
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID...
Copyright © 2015 Shugo Mikami et al. This is an open access article distributed under the Creative C...
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time ...
Passively powered radio frequency (RFID) tags are a class of devices powered via harvested ultra hig...
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing se...
This paper describes a low power implementation of a secure EPC UHF Passive RFID Tag baseband system...
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms...
Abstract: This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for...
The design of fully-passive UHF RFID tags preserving cost-effectiveness, yet supplying augmented cap...
Abstract — RFID (Radio Frequency IDentification) tags need to include security functions, yet at the...
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a lim...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
This paper presents a security-enhanced baseband system for UH R ID tag, which is based on ISO1 000-...
RFID is a technology that allows identification and authentication of objects or persons through the...
Abstract Passive radio-frequency identification (RFID) tags have long been thought to be too weak to...
Passive radio-frequency identification (RFID) tag has been used in many applications. While the RFID...
Copyright © 2015 Shugo Mikami et al. This is an open access article distributed under the Creative C...
RFID (Radio Frequency IDentification) tags need to include security functions, yet at the same time ...
Passively powered radio frequency (RFID) tags are a class of devices powered via harvested ultra hig...
RFID technology increases rapidly its applicability in new areas of interest without guaranteeing se...
This paper describes a low power implementation of a secure EPC UHF Passive RFID Tag baseband system...
The security of embedded devices often relies on the secrecy of proprietary cryptographic algorithms...
Abstract: This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for...
The design of fully-passive UHF RFID tags preserving cost-effectiveness, yet supplying augmented cap...
Abstract — RFID (Radio Frequency IDentification) tags need to include security functions, yet at the...
This thesis addresses concepts of implementing a RSA cryptosystem on a passive RFID tag. With a lim...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
This paper presents a security-enhanced baseband system for UH R ID tag, which is based on ISO1 000-...
RFID is a technology that allows identification and authentication of objects or persons through the...