Login / Signup
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse.
Krishna Bagadia
Urbi Chatterjee
Debapriya Basu Roy
Debdeep Mukhopadhyay
Rajat Subhra Chakraborty
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
authentication protocol
rfid tags
low cost
rfid systems
mutual authentication
radio frequency identification
lightweight
rfid technology
smart card
public key
real time
security protocols
embedded systems
security analysis
cost effective
secret key
authentication scheme
security issues
supply chain