{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:57:43Z","timestamp":1774540663361,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540226666","type":"print"},{"value":"9783540286325","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28632-5_26","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T20:45:31Z","timestamp":1285015531000},"page":"357-370","source":"Crossref","is-referenced-by-count":317,"title":["Strong Authentication for RFID Systems Using the AES Algorithm"],"prefix":"10.1007","author":[{"given":"Martin","family":"Feldhofer","sequence":"first","affiliation":[]},{"given":"Sandra","family":"Dominikus","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Wolkerstorfer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/978-3-540-45238-6_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2003","author":"P. Chodowiec","year":"2003","unstructured":"Chodowiec, P., Gaj, K.: Very Compact FPGA Implementation of the AES Algorithm. In: Walter, C.D., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2003. LNCS, vol.\u00a02779, pp. 319\u2013333. Springer, Heidelberg (2003)"},{"key":"26_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45682-1_1","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"W. Diffie","year":"2001","unstructured":"Diffie, W., Hellman, M.: Cryptanalysis of the NTRU Signature Scheme (NSS). In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, p. 1. Springer, Heidelberg (2001)"},{"key":"26_CR3","unstructured":"EPCglobal. 13.56 MHz ISM Band Class 1 Radio Frequency (RF) Identification Tag Interface Specification, http:\/\/www.epcglobalinc.org\/ (February 2003)"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Finkenzeller, K.: RFID-Handbook, 2nd edn. Carl Hanser Verlag M\u00fcnchen (April 2003)","DOI":"10.1002\/0470868023"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/BFb0054868","volume-title":"Algorithmic Number Theory","author":"J. Hoffstein","year":"1998","unstructured":"Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A Ring-Based Public Key Cryptosystem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 267\u2013288. Springer, Heidelberg (1998)"},{"key":"26_CR6","unstructured":"International Organization for Standardization. ISO\/IEC 9798-2: Information Technology - Security techniques \u2014 Entity Authentication Mechanisms Part 2: Entity authentication using symmetric techniques. ISO\/IEC (1993)"},{"key":"26_CR7","unstructured":"International Organization for Standardization. ISO\/IEC 18000-3. Information Technology AIDC Techniques \u2014 RFID for Item Management (March 2003)"},{"key":"26_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/978-3-540-45126-6_8","volume-title":"Financial Cryptography","author":"A. Juels","year":"2003","unstructured":"Juels, A., Pappu, R.: Squealing Euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 103\u2013121. Springer, Heidelberg (2003)"},{"key":"26_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/948109.948126","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communication Security","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 103\u2013111. ACM Press, New York (2003)"},{"issue":"4","key":"26_CR10","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/TC.2003.1190589","volume":"52","author":"S. Mangard","year":"2003","unstructured":"Mangard, S., Aigner, M., Dominikus, S.: A Highly Regular and Scalable AES Hardware Architecture. IEEE Transactions on Computers\u00a052(4), 483\u2013491 (2003)","journal-title":"IEEE Transactions on Computers"},{"key":"26_CR11","unstructured":"May, A.: Cryptanalysis of NTRU. preprint, (unpublished) (February 1999)"},{"key":"26_CR12","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997), Available online at http:\/\/www.cacr.math.uwaterloo.ca\/hac\/"},{"key":"26_CR13","unstructured":"National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard (November 2001), Available online at http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"26_CR14","unstructured":"Pramstaller, N., Wolkerstorfer, J.: An Efficient AES Implementation for Reconfigurable Devices. In: Austrochip 2003, Proceedings, Linz, Austria, October 1, pp. 5\u20138 (2003)"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/3-540-36400-5_33","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S.E. Sarma","year":"2003","unstructured":"Sarma, S.E., Weis, S.A., Engels, D.W.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 454\u2013469. Springer, Heidelberg (2003)"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Verbauwhede, I., Schaumont, P., Kuo, H.: Design and Performance Testing of a 2.29 Gb\/s Rijndael Processor. IEEE Journal of Solid-State Circuits, 569\u2013572 (March 2003)","DOI":"10.1109\/JSSC.2002.808300"},{"key":"26_CR17","unstructured":"Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master\u2019s thesis, Massachusetts Institute of Technology, Cambridge, MA 02139 (May 2003)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 201\u2013212. Springer, Heidelberg (2004)"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/3-540-45760-7_6","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"J. Wolkerstorfer","year":"2002","unstructured":"Wolkerstorfer, J., Oswald, E., Lamberger, M.: An ASIC implementation of the AES sBoxes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 67\u201378. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Cryptographic Hardware and Embedded Systems - CHES 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28632-5_26.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:26:09Z","timestamp":1605759969000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28632-5_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540226666","9783540286325"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28632-5_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}