Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
Top Cited Papers
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableThis publication has 17 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Squealing Euros: Privacy Protection in RFID-Enabled BanknotesLecture Notes in Computer Science, 2003
- Foundations of CryptographyPublished by Cambridge University Press (CUP) ,2001
- Security Weaknesses in BluetoothLecture Notes in Computer Science, 2001
- On the Minimal Hardware Complexity of Pseudorandom Function GeneratorsLecture Notes in Computer Science, 2001
- Differential Power AnalysisLecture Notes in Computer Science, 1999
- NTRU: A ring-based public key cryptosystemLecture Notes in Computer Science, 1998
- On the Importance of Checking Cryptographic Protocols for FaultsLecture Notes in Computer Science, 1997
- Authentication and delegation with smart-cardsLecture Notes in Computer Science, 1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988