{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:04:48Z","timestamp":1761807888556,"version":"3.40.5"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_1","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Lightweight Authentication Protocols on Ultra-Constrained RFIDs - Myths and Facts"],"prefix":"10.1007","author":[{"given":"Frederik","family":"Armknecht","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Hamann","sequence":"additional","affiliation":[]},{"given":"Vasily","family":"Mikhalev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abyaneh, M.R.S.: On the security of non-linear HB (NLHB) protocol against passive attack. In: 2010 IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp. 523\u2013528. IEEE (2010)","DOI":"10.1109\/EUC.2010.86"},{"issue":"11","key":"1_CR2","doi-asserted-by":"publisher","first-page":"3723","DOI":"10.1109\/TCSI.2008.927220","volume":"55","author":"GK Balachandran","year":"2008","unstructured":"Balachandran, G.K., Barnett, R.E.: A 440-nA true random number generator for passive RFID tags. IEEE Trans. Circ. Syst. I: Regular Pap. 55(11), 3723\u20133732 (2008)","journal-title":"IEEE Trans. Circ. Syst. I: Regular Pap."},{"key":"1_CR3","unstructured":"Bosley, C., Haralambiev, K., Nicolosi, A.: HB$$^{N}$$: An HB-like protocol secure against man-in-the-middle attacks. IACR Cryptology ePrint Archive 2011, p. 350 (2011)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H.:. Trusted-HB: A low-cost version of HB$$^{+}$$ secure against man-in-the-middle attacks. arXiv preprint (2008). arXiv:0802.0603","DOI":"10.1109\/TIT.2008.928290"},{"key":"1_CR5","unstructured":"Bringer, J., Chabanne, H., Dottax, E.: HB$$^{++}$$: A lightweight authentication protocol secure against some attacks. In: Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006, SecPerU 2006, pp. 28\u201333. IEEE (2006)"},{"key":"1_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71641-9","volume-title":"Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting","author":"PH Cole","year":"2008","unstructured":"Cole, P.H., Ranasinghe, D.C.: Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting, 1st edn. Springer, Berlin Heidelberg (2008)","edition":"1"},{"key":"1_CR7","unstructured":"Duc, D.N., Kim, K.: Securing HB$$^{+}$$ against GRS man-in-the-middle attack. In: Institute of Electronics, Information and Communication Engineers, Symposium on Cryptography and Information Security (2007)"},{"issue":"1","key":"1_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1049\/ip-com:20040966","volume":"152","author":"M Feldhofer","year":"2005","unstructured":"Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEE Proc.: Inf. Secur. 152(1), 13\u201320 (2005)","journal-title":"IEE Proc.: Inf. Secur."},{"key":"1_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"1_CR10","unstructured":"Frumkin, D., Shamir, A.: Untrusted-HB: Security vulnerabilities of Trusted-HB. Cryptology ePrint Archive, Report 2009\/044 (2009)"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1007\/978-3-319-04852-9_11","volume-title":"Topics in Cryptology \u2013 CT-RSA 2014","author":"L Gaspar","year":"2014","unstructured":"Gaspar, L., Leurent, G., Standaert, F.-X.: Hardware implementation and side-channel analysis of lapin. In: Benaloh, J. (ed.) CT-RSA 2014. LNCS, vol. 8366, pp. 206\u2013226. Springer, Heidelberg (2014)"},{"issue":"21","key":"1_CR12","doi-asserted-by":"publisher","first-page":"1169","DOI":"10.1049\/el:20052622","volume":"41","author":"H Gilbert","year":"2005","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: Active attack against $$\\text{ HB }^+$$: A provably secure lightweight authentication protocol. Electron. Lett. 41(21), 1169\u20131170 (2005)","journal-title":"Electron. Lett."},{"key":"1_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-85230-8_12","volume-title":"Financial Cryptography and Data Security","author":"H Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: Good variants of HB$$^ \\text{+ } $$ are hard to find. In: Tsudik, G. (ed.) FC 2008. LNCS, vol. 5143, pp. 156\u2013170. Springer, Heidelberg (2008)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M., Seurin, Y.: : Increasing the security and efficiency of HB$$^{+}$$. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions (corresp.). IEEE Trans. Inf. Theory 14(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"G Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: PUF-HB: A tamper-resilient HB based authentication protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 346\u2013365. Springer, Heidelberg (2008)"},{"key":"1_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-642-34047-5_20","volume-title":"Fast Software Encryption","author":"S Heyse","year":"2012","unstructured":"Heyse, S., Kiltz, E., Lyubashevsky, V., Paar, C., Pietrzak, K.: Lapin: An efficient authentication protocol based on Ring-LPN. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 346\u2013365. Springer, Heidelberg (2012)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"NJ Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure human identification protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"issue":"2","key":"1_CR19","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","volume":"24","author":"A Juels","year":"2006","unstructured":"Juels, A.: RFID security and privacy: A research survey. IEEE J. Sel. A. Commun. 24(2), 381\u2013394 (2006)","journal-title":"IEEE J. Sel. A. Commun."},{"key":"1_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating pervasive devices with human protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"1_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/11761679_6","volume-title":"Advances in Cryptology - EUROCRYPT 2006","author":"J Katz","year":"2006","unstructured":"Katz, J., Shin, J.S.: Parallel and concurrent security of the HB and HB$$^{+}$$ protocols. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 73\u201387. Springer, Heidelberg (2006)"},{"issue":"3","key":"1_CR22","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/s00145-010-9061-2","volume":"23","author":"J Katz","year":"2010","unstructured":"Katz, J., Shin, J.S., Smith, A.: Parallel and concurrent security of the HB and HB$$^{+}$$ protocols. J. Cryptol. 23(3), 402\u2013421 (2010)","journal-title":"J. Cryptol."},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-3-642-20465-4_3","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"E Kiltz","year":"2011","unstructured":"Kiltz, E., Pietrzak, K., Cash, D., Jain, A., Venturi, D.: Efficient authentication from hard learning problems. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 7\u201326. Springer, Heidelberg (2011)"},{"key":"1_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"1_CR25","doi-asserted-by":"crossref","unstructured":"Leng, X., Mayes, K., Markantonakis, K.: HB-MP$$^{+}$$ protocol: An improvement on the HB-MP protocol. In: 2008 IEEE International Conference on RFID, pp. 118\u2013124. IEEE (2008)","DOI":"10.1109\/RFID.2008.4519342"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1007\/11832072_24","volume-title":"Security and Cryptography for Networks","author":"\u00c9 Levieil","year":"2006","unstructured":"Levieil, \u00c9., Fouque, P.-A.: An improved LPN algorithm. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 348\u2013359. Springer, Heidelberg (2006)"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Madhavan, M., Thangaraj, A., Sankarasubramanian, Y., Viswanathan, K.: NLHB: A non-linear Hopper-Blum protocol. In: 2010 IEEE International Symposium on Information Theory Proceedings (ISIT), pp. 2498\u20132502. IEEE (2010)","DOI":"10.1109\/ISIT.2010.5513440"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Martin, H., Mill\u00e1n, E.S., Entrena, L., Castro, J.C.H., Peris-Lopez, P.: AKARI-X: A pseudorandom number generator for secure lightweight systems. In: IOLTS, pp. 228\u2013233 (2011)","DOI":"10.1109\/IOLTS.2011.5994534"},{"issue":"3","key":"1_CR29","doi-asserted-by":"publisher","first-page":"3816","DOI":"10.3390\/s130303816","volume":"13","author":"J Meli\u00e0-Segu\u00ed","year":"2013","unstructured":"Meli\u00e0-Segu\u00ed, J., Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J.: J3Gen: A PRNG for low-cost passive RFID. Sensors 13(3), 3816\u20133830 (2013)","journal-title":"Sensors"},{"issue":"9","key":"1_CR30","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: A further step in the HB-family of lightweight authentication protocols. Comput. Netw. 51(9), 2262\u20132267 (2007)","journal-title":"Comput. Netw."},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-89255-7_8","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"K Ouafi","year":"2008","unstructured":"Ouafi, K., Overbeck, R., Vaudenay, S.: On the security of against a man-in-the-middle attack. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 108\u2013124. Springer, Heidelberg (2008)"},{"issue":"1","key":"1_CR32","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.csi.2007.11.013","volume":"31","author":"P Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: LAMED - A PRNG for EPC Class-1 generation-2 RFID specification. Comput. Stand. Interfaces 31(1), 88\u201397 (2009)","journal-title":"Comput. Stand. Interfaces"},{"key":"1_CR33","unstructured":"Pietrzak, K.: Subspace LWE, Manuscript. http:\/\/homepages.cwi.nl\/~pietrzak\/publications\/SLWE.pdf"},{"key":"1_CR34","unstructured":"Piramuthu, S., TU, Y.-J.: Modified HB authentication protocol. In: WEWoRC, pp. 41\u201344 (2007)"},{"key":"1_CR35","unstructured":"Poschmann, A.: Lightweight cryptography: Cryptographic engineering for a pervasive world (2009)"},{"issue":"2","key":"1_CR36","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s00145-010-9086-6","volume":"24","author":"A Poschmann","year":"2011","unstructured":"Poschmann, A., Moradi, A., Khoo, K., Lim, C., Wang, H., Ling, S.: Side-channel resistant crypto for less than 2,300 GE. J. Cryptol. 24(2), 322\u2013345 (2011)","journal-title":"J. Cryptol."},{"key":"1_CR37","unstructured":"Ranasinghe, D.C., Engels, D.W., Cole, P.H.: Low-cost RFID systems: Confronting security and privacy. In: Auto-ID Labs Research Workshop, Portal (2005)"},{"key":"1_CR38","unstructured":"Repec, C.A.: Regulatory status for using RFID in the EPC Gen 2 band (860 to 960 MHz) of the UHF spectrum (2013). http:\/\/www.gs1.org\/docs\/epcglobal\/UHF_Regulations.pdf"},{"key":"1_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1007\/978-3-642-31284-7_29","volume-title":"Applied Cryptography and Network Security","author":"P Rizomiliotis","year":"2012","unstructured":"Rizomiliotis, P., Gritzalis, S.: : A provably secure HB-like lightweight authentication protocol. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 489\u2013506. Springer, Heidelberg (2012)"},{"key":"1_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-3-642-03748-1_16","volume-title":"Trust, Privacy and Security in Digital Business","author":"P Rizomiliotis","year":"2009","unstructured":"Rizomiliotis, P.: HB $$-$$ MAC: Improving the Random $$-$$ authentication protocol. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 159\u2013168. Springer, Heidelberg (2009)"},{"key":"1_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-540-85893-5_7","volume-title":"Smart Card Research and Advanced Applications","author":"C Rolfes","year":"2008","unstructured":"Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-lightweight implementations for smart devices \u2013 Security for 1000 gate equivalents. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 89\u2013103. Springer, Heidelberg (2008)"},{"key":"1_CR42","unstructured":"Saarinen, M.-J.O., Engels, D.W.: A do-it-all-cipher for RFID: Design requirements (extended abstract). IACR Cryptology ePrint Archive, 2012, p. 317 (2012) (informal publication)"},{"key":"1_CR43","unstructured":"Song, X., Kobara, K., Imafuku, K., Imai, H.: HB$$^{b}$$ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader\u2019s response. In: 2012 International Symposium on Information Theory and its Applications (ISITA), pp. 536\u2013540. IEEE (2012)"},{"key":"1_CR44","first-page":"304","volume-title":"RFID and the Internet of Things","author":"J Susini","year":"2011","unstructured":"Susini, J., Chabanne, H., Urien, P.: RFID and the Internet of Things, p. 304. ISTE - Wiley, London (2011)"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Tokunaga, C., Blaauw, D., Mudge, T.: True random number generator with a metastability-based quality control. In: Solid-State Circuits Conference, 2007, ISSCC 2007. Digest of Technical Papers. IEEE International, pp. 404\u2013611, Feb 2007","DOI":"10.1109\/ISSCC.2007.373465"},{"key":"1_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-21554-4_19","volume-title":"Applied Cryptography and Network Security","author":"W Wu","year":"2011","unstructured":"Wu, W., Zhang, L.: LBlock: A lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327\u2013344. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:31:39Z","timestamp":1747161099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}