Login / Signup
Cryptanalysis of Two RFID Authentication Protocols .
Tianjie Cao
Peng Shen
Published in:
Int. J. Netw. Secur. (2009)
Keyphrases
</>
authentication protocol
rfid tags
secret key
rfid systems
radio frequency identification
hash functions
low cost
rfid technology
smart card
public key
lightweight
resource constrained
cost effective
security issues
key management
security analysis
security protocols
ban logic
signature scheme
similarity search
ciphertext
cryptographic protocols
power consumption
supply chain