A secure and privacy friendly ECC based RFID authentication protocol for practical applications

A Arslan, SA Çolak, S Ertürk - Wireless Personal Communications, 2021 - Springer
Radio frequency identification (RFID) is a promising and widespread wireless
communication technology for entity identification or authentication. By the emerging Internet …

Are RNGs achilles' heel of RFID security and privacy protocols?

A Arslan, S Kardaş, SA Çolak, S Ertürk - Wireless Personal …, 2018 - Springer
Security and privacy concerns have been growing with the increased utilisation of RFID
technology in our daily lives. To mitigate these issues, numerous privacy-friendly …

Fully Integrated Passive UHF RFID Tag for Hash‐Based Mutual Authentication Protocol

S Mikami, D Watanabe, Y Li… - The Scientific World …, 2015 - Wiley Online Library
Passive radio‐frequency identification (RFID) tag has been used in many applications.
While the RFID market is expected to grow, concerns about security and privacy of the RFID …

Single-chip implementation and evaluation of passive UHF RFID tag with hash-based mutual authentication

Y Li, S Mikami, D Watanabe, K Ohta… - Radio Frequency …, 2014 - ebooks.iospress.nl
This paper presents a single-chip implementation and evaluation of a passive ultra-high
frequency (UHF) RFID tag that uses hash-based mutual authentication protocol …

[PDF][PDF] RFID authentication and time-memory trade-offs.

X Carpent - 2015 - dial.uclouvain.be
ABSTRACT RFID is a technology that allows identification and authentication of objects or
persons through the use of wireless communication between tags and readers. RFID Tags …

Double Time-Memory Trade-Off in OSK RFID Protocol

V Tomašević, M Tomašević - Wireless Personal Communications, 2019 - Springer
The OSK/AO protocol has already demonstrated how the application of time-memory trade-
off (TMTO) increases the efficiency of a hash chain-based RFID protocol. The complexity of …

DESIGN METHODOLOGY OF SECURE RFID TAG IMPLEMENTATION

三上修吾, ミカミシュウゴ - 2017 - uec.repo.nii.ac.jp
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement,
and evaluate hardware performance of a secure tag that runs the authentication protocol …

[PDF][PDF] DESIGN METHODOLOGY OF SECURE RFID TAG IMPLEMENTATION

S MIKAMI - 2017 - core.ac.uk
In this thesis, we focus on radio frequency identification (RFID) tag. We design, implement,
and evaluate hardware performance of a secure tag that runs the authentication protocol …