Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation (English)
- New search for: Kasper, Timo
- New search for: Oswald, David
- New search for: Paar, Christof
- New search for: Kasper, Timo
- New search for: Oswald, David
- New search for: Paar, Christof
In:
RFID. Security and Privacy
;
61-77
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation
-
Contributors:
-
Published in:RFID. Security and Privacy ; 61-77Lecture Notes in Computer Science ; 7055 ; 61-77
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:17 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
KLEIN: A New Family of Lightweight Block CiphersGong, Zheng / Nikova, Svetla / Law, Yee Wei et al. | 2012
- 19
-
The Hummingbird-2 Lightweight Authenticated Encryption AlgorithmEngels, Daniel / Saarinen, Markku-Juhani O. / Schweitzer, Peter / Smith, Eric M. et al. | 2012
- 32
-
Elliptic Curve Cryptography on the WISP UHF RFID TagPendl, Christian / Pelnar, Markus / Hutter, Michael et al. | 2012
- 48
-
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES ImplementationBarenghi, Alessandro / Hocquet, Cédric / Bol, David / Standaert, François-Xavier / Regazzoni, Francesco / Koren, Israel et al. | 2012
- 61
-
Side-Channel Analysis of Cryptographic RFIDs with Analog DemodulationKasper, Timo / Oswald, David / Paar, Christof et al. | 2012
- 78
-
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable FunctionsKardaş, Süleyman / Kiraz, Mehmet Sabir / Bingöl, Muhammed Ali / Demirci, Hüseyin et al. | 2012
- 94
-
Security Analysis of Two Distance-Bounding ProtocolsAbyaneh, Mohammad Reza Sohizadeh et al. | 2012
- 108
-
An Automatic, Time-Based, Secure Pairing Protocol for Passive RFIDAmariucai, George T. / Bergman, Clifford / Guan, Yong et al. | 2012
- 127
-
BUPLE: Securing Passive RFID Communication through Physical Layer EnhancementsChai, Qi / Gong, Guang et al. | 2012
- 147
-
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled DelegationFernàndez-Mir, Albert / Trujillo-Rasua, Rolando / Castellà-Roca, Jordi / Domingo-Ferrer, Josep et al. | 2012
- 163
-
ROTIV: RFID Ownership Transfer with Issuer VerificationElkhiyaoui, Kaoutar / Blass, Erik-Oliver / Molva, Refik et al. | 2012
- 183
-
Hierarchical ECC-Based RFID Authentication ProtocolBatina, Lejla / Seys, Stefaan / Singelée, Dave / Verbauwhede, Ingrid et al. | 2012