Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Chao LvHui LiJianfeng MaYaoyu ZhangPublished in: Trans. Emerg. Telecommun. Technol. (2012)
Keyphrases
- authentication protocol
- elliptic curve cryptography
- rfid tags
- authentication scheme
- public key
- rfid systems
- security analysis
- radio frequency identification
- low cost
- user authentication
- smart card
- public key cryptography
- lightweight
- image encryption
- rfid technology
- high security
- secret key
- cost effective
- security issues
- security protocols
- key distribution
- private key
- power consumption
- resource constrained
- digital signature
- elliptic curve
- encryption scheme
- cryptographic protocols
- diffie hellman
- security mechanisms
- digital watermark
- real time