{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:17:45Z","timestamp":1742383065258},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_10","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"103-122","source":"Crossref","is-referenced-by-count":4,"title":["Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly"],"prefix":"10.1007","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Tania","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-540-76788-6_9","volume-title":"Information Security and Cryptology - ICISC 2007","author":"B. Alomair","year":"2007","unstructured":"Alomair, B., Lazos, L., Poovendran, R.: Passive Attacks on a Class of Authentication Protocols for RFID. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol.\u00a04817, pp. 102\u2013115. Springer, Heidelberg (2007)"},{"key":"10_CR2","unstructured":"Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, USA, pp. 1\u201311 (November 1996)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/BFb0028165","volume-title":"Security Protocols","author":"R. Anderson","year":"1998","unstructured":"Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol.\u00a01361, pp. 125\u2013136. Springer, Heidelberg (1998)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Barasz, M., Boros, B., Ligeti, P., Loja, K., Nagy, D.: Breaking LMAP. In: Workshop on RFID Security, RFIDSec 2007, Malaga, Spain (July 2007)","DOI":"10.1109\/SECCOM.2007.4550374"},{"key":"10_CR6","unstructured":"B\u00e1r\u00e1sz, M., Boros, B., Ligeti, P., L\u00f3ja, K., Nagy, D.: Passive Attack Against the M2AP Mutual Authentication Protocol for RFID Tags. In : First International EURASIP Workshop on RFID Technology, Vienna, Austria (September 2007)"},{"issue":"9","key":"10_CR7","doi-asserted-by":"publisher","first-page":"4339","DOI":"10.1109\/TIT.2008.928290","volume":"54","author":"J. Bringer","year":"2008","unstructured":"Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory\u00a054(9), 4339\u20134342 (2008)","journal-title":"IEEE Transactions on Information Theory"},{"key":"10_CR8","volume-title":"IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006","author":"J. Bringer","year":"2006","unstructured":"Bringer, J., Chabanne, H., Emmanuelle, D.: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In: IEEE International Conference on Pervasive Services, Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, Lyon, France. IEEE, Los Alamitos (2006)"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Butty\u00e1n, L., Holczer, T., Vajda, I.: Optimal Key-Trees for Tree-Based Private Authentication. In: Workshop on Privacy Enhancing Technologies, PET 2006, Cambridge, UK (June 2006)","DOI":"10.1007\/11957454_19"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TDSC.2008.32","volume":"6","author":"T. Cao","year":"2008","unstructured":"Cao, T., Bertino, E., Lei, H.: Security analysis of the SASI protocol. IEEE Transactions on Dependable and Secure Computing\u00a06, 73\u201377 (2008)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"4","key":"10_CR11","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TDSC.2007.70226","volume":"4","author":"H.-Y. Chien","year":"2007","unstructured":"Chien, H.-Y.: SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing\u00a04(4), 337\u2013340 (2007)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ - A provably Secure Lightweight Authentication Protocol (July 2005) (manuscript)","DOI":"10.1049\/el:20052622"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-78967-3_21","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2008","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J., Seurin, Y.: HB#: Increasing the Security and Efficiency of HB+. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.\u00a04965, pp. 361\u2013378. Springer, Heidelberg (2008)"},{"key":"10_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/978-3-540-70583-3_55","volume-title":"Automata, Languages and Programming","author":"H. Gilbert","year":"2008","unstructured":"Gilbert, H., Robshaw, M.J., Seurin, Y.: How to Encrypt with the LPN Problem. In: Aceto, L., Damg\u00e5rd, I., Goldberg, L.A., Halld\u00f3rsson, M.M., Ing\u00f3lfsd\u00f3ttir, A., Walukiewicz, I. (eds.) ICALP 2008, Part II. LNCS, vol.\u00a05126, pp. 679\u2013690. Springer, Heidelberg (2008)"},{"key":"10_CR15","unstructured":"Halevi, T., Saxena, N., Halevi, S.: Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population. In: Workshop on RFID Security, RFIDSec 2009, Leuven, Belgium (July 2009)"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1007\/978-3-540-68914-0_21","volume-title":"Applied Cryptography and Network Security","author":"G. Hammouri","year":"2008","unstructured":"Hammouri, G., Sunar, B.: PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol.\u00a05037, pp. 346\u2013365. Springer, Heidelberg (2008)"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Hopper, N.J., Blum, M.: A Secure Human-Computer Authentication Scheme. Technical report, Computer Science Department, School of Computer Science, Carnegie Mellon University (May 2000)","DOI":"10.21236\/ADA382135"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/3-540-45682-1_4","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"N.J. Hopper","year":"2001","unstructured":"Hopper, N.J., Blum, M.: Secure Human Identification Protocols. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 52\u201366. Springer, Heidelberg (2001)"},{"key":"10_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/11535218_18","volume-title":"Advances in Cryptology \u2013 CRYPTO 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Weis, S.A.: Authenticating Pervasive Devices with Human Protocols. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.\u00a03621, pp. 293\u2013308. Springer, Heidelberg (2005)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Leng, X., Mayes, K., Markantonakis, K.: HB-MP+ Protocol: An Improvement on the HB-MP Protocol. In: IEEE International Conference on RFID, pp. 118\u2013124 (April 2008)","DOI":"10.1109\/RFID.2008.4519342"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Li, T., Deng, R.H.: Vulnerability Analysis of EMAP - An Efficient RFID Mutual Authentication Protocol. In: Second International Conference on Availability, Reliability and Security, AReS 2007, Vienna, Austria (April 2007)","DOI":"10.1109\/ARES.2007.159"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Li, T., Wang, G.: Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. In: IFIP SEC 2007, Sandton, Gauteng, South Africa (May 2007)","DOI":"10.1007\/978-0-387-72367-9_10"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Madhavan, M., Thangaraj, A., Sankarasubramaniam, Y., Viswanathan, K.: NLHB: A Non-Linear Hopper Blum Protocol. arXiv.org (February 2010)","DOI":"10.1109\/ISIT.2010.5513440"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1145\/1030083.1030112","volume-title":"ACM Conference on Computer and Communications Security, ACM CCS 2004","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: ACM Conference on Computer and Communications Security, ACM CCS 2004, Washington, DC, USA, pp. 210\u2013219. ACM, New York (October 2004)"},{"issue":"9","key":"10_CR25","doi-asserted-by":"publisher","first-page":"2262","DOI":"10.1016\/j.comnet.2007.01.011","volume":"51","author":"J. Munilla","year":"2007","unstructured":"Munilla, J., Peinado, A.: HB-MP: A Further Step in the HB-Family of Lightweight Authentication Protocols. Computer Networks\u00a051(9), 2262\u20132267 (2007)","journal-title":"Computer Networks"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/11935308_16","volume-title":"Information and Communications Security","author":"K. Nohl","year":"2006","unstructured":"Nohl, K., Evans, D.: Quantifying Information Leakage in Tree-Based Hash Protocols. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 228\u2013237. Springer, Heidelberg (2006)"},{"key":"10_CR27","unstructured":"Organization, I.C.A.: Machine Readable Travel Documents, Doc 9303, Part 1, Machine Readable Passports, 5 (edn.) (2003)"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags. In: Workshop on RFID Security, RFIDSec 2006, Graz, Austria (July 2006)","DOI":"10.1007\/11915034_59"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J., Ribagorda, A.: M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol.\u00a04159, pp. 912\u2013923. Springer, Heidelberg (2006)"},{"key":"10_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04277, pp. 352\u2013361. Springer, Heidelberg (2006)"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-642-00306-6_5","volume-title":"Information Security Applications","author":"P. Peris-Lopez","year":"2009","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: Advances in Ultralightweight Cryptography for Low-cost RFID Tags: Gossamer Protocol. In: Chung, K.-I., Sohn, K., Yung, M. (eds.) WISA 2008. LNCS, vol.\u00a05379, pp. 56\u201368. Springer, Heidelberg (2009)"},{"key":"10_CR32","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TDSC.2008.33","volume":"6","author":"R.C.-W. Phan","year":"2008","unstructured":"Phan, R.C.-W.: Cryptanalysis of a New Ultralightweight RFID Authentication Protocol - SASI. IEEE Transactions on Dependable and Secure Computing\u00a06, 316\u2013320 (2008)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"10_CR33","unstructured":"Semiconductors, N.: MIFARE Smartcards ICs, http:\/\/www.nxp.com\/products\/identification\/card_ics\/mifare"},{"key":"10_CR34","unstructured":"Sun, H.-M., Ting, W.-C., Wang, K.-H.: On the Security of Chien\u2019s Ultra-Lightweight RFID Authentication Protocol. IEEE Transactions on Dependable and Secure Computing\u00a099 (2009)"},{"key":"10_CR35","unstructured":"Yoon, B.: HB-MP++ Protocol: An Ultra Light-weight Authentication Protocol for RFID System. In: IEEE International Conference on RFID, Orlando, FL, USA (April 2009)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:49:11Z","timestamp":1606186151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}