Cryptanalysis of Two RFID Authentication Protocols .
Tianjie CaoPeng ShenPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- authentication protocol
- rfid tags
- secret key
- rfid systems
- radio frequency identification
- hash functions
- low cost
- rfid technology
- smart card
- public key
- lightweight
- resource constrained
- cost effective
- security issues
- key management
- security analysis
- security protocols
- ban logic
- signature scheme
- similarity search
- ciphertext
- cryptographic protocols
- power consumption
- supply chain