Authentication for low-cost Radio-Frequency IDentification (RFID) is a booming research topic. The challenge is to develop secure protocols using lightweight cryptography, yet ensuring privacy. A current trend is to design such protocols upon the Learning Parity from Noise (LPN) problem. The first who introduced this solution were Hopper and Blum in 2001. Since then, many protocols have been designed, especially the protocol of Halevi, Saxena, and Halevi (HSH) that combines LPN and the tree-based key infrastructure suggested by Molnar and Wagner. In this paper, we introduce a new RFID authentication protocol that is less resource consuming than HSH, relying on the same adversary model and security level, though. Afterwards, we show that, if...
Privacy protection is a very important issue during authentications in RFID systems. In order to ach...
Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be ...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
This paper presents an authentication protocol of RFID system where both the tag and the reader are ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Protecting RFID security and privacy is very important to the future development of RFID technology....
In the recent years, several light-weight cryptographic solutions have been proposed for RFID system...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
Radio frequency identification (RFID) is an emerg-ing technology for automatic object identification...
he recent advent of ubiquitous technologies has raised an important concern for citizens: the need t...
The Publisher's final version can be found by following the DOI linkThe recent advent of ubiquitous ...
Privacy protection is a very important issue during authentications in RFID systems. In order to ach...
Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be ...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...
Existing RFID Privacy-Preserving Authentication (PPA) solutions mainly focus on the design of crypto...
This paper presents an authentication protocol of RFID system where both the tag and the reader are ...
The emergence of pervasive computing devices has raised several privacy issues. In this paper, we ad...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Protecting RFID security and privacy is very important to the future development of RFID technology....
In the recent years, several light-weight cryptographic solutions have been proposed for RFID system...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
Radio frequency identification (RFID) is an emerg-ing technology for automatic object identification...
he recent advent of ubiquitous technologies has raised an important concern for citizens: the need t...
The Publisher's final version can be found by following the DOI linkThe recent advent of ubiquitous ...
Privacy protection is a very important issue during authentications in RFID systems. In order to ach...
Radio frequency identification (RFID) is a ubiquitous wireless technology that allows objects to be ...
RFID is an important technology that can be used to create the ubiquitous society. But an RFID syste...