Sciweavers

173 search results - page 8 / 35
» Classification of RFID Attacks
Sort
View
AINA
2005
IEEE
14 years 1 months ago
Grouping Proof for RFID Tags
An RFID tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. The tag is used for management of goods and its distribution. Moreove...
Junichiro Saito, Kouichi Sakurai
IPPS
2009
IEEE
14 years 2 months ago
Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol
—We present a metaheuristic-based attack against the traceability of an ultra-lightweight authentication protocol for RFID environments called SLMAP, and analyse its implications...
Julio C. Hernandez-Castro, Juan E. Tapiador, Pedro...
INDOCRYPT
2009
Springer
14 years 2 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly efficient implement...
Olivier Billet, Kaoutar Elkhiyaoui
WISA
2009
Springer
14 years 6 days ago
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment
We introduce low-cost hardware for performing non-invasive side-channel attacks on Radio Frequency Identication Devices (RFID) and develop techniques for facilitating a correlatio...
Timo Kasper, David Oswald, Christof Paar
CHES
2007
Springer
101views Cryptology» more  CHES 2007»
14 years 1 months ago
Power and EM Attacks on Passive 13.56 MHz RFID Devices
Michael Hutter, Stefan Mangard, Martin Feldhofer