{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:19:49Z","timestamp":1761895189004},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642168215"},{"type":"electronic","value":"9783642168222"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16822-2_13","type":"book-chapter","created":{"date-parts":[[2010,11,2]],"date-time":"2010-11-02T13:56:19Z","timestamp":1288706179000},"page":"138-157","source":"Crossref","is-referenced-by-count":24,"title":["Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols"],"prefix":"10.1007","author":[{"given":"Gildas","family":"Avoine","sequence":"first","affiliation":[]},{"given":"Iwen","family":"Coisel","sequence":"additional","affiliation":[]},{"given":"Tania","family":"Martin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"40th Annual IEEE\/IFIP International Conference on Dependable Systems and Network, DSN 2010","author":"B. Alomair","year":"2010","unstructured":"Alomair, B., Clark, A., Cuellar, J., Poovendran, R.: Scalable RFID Systems: a Privacy-Preserving Protocol with Constant-Time Identification. In: 40th Annual IEEE\/IFIP International Conference on Dependable Systems and Network, DSN 2010, Chicago, IL, USA, 2010. IEEE Computer Society Press, Los Alamitos (2010)"},{"key":"13_CR2","unstructured":"Avoine, G.: Adversary Model for Radio Frequency Identification. Technical Report LASEC-REPORT-2005-001, Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), Lausanne, Switzerland (2005)"},{"key":"13_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/11693383_20","volume-title":"Selected Areas in Cryptography","author":"G. Avoine","year":"2006","unstructured":"Avoine, G., Dysli, E., Oechslin, P.: Reducing Time Complexity in RFID Systems. In: Preneel, B., Tavares, S. (eds.) SAC 2005. LNCS, vol.\u00a03897, pp. 291\u2013306. Springer, Heidelberg (2006)"},{"key":"13_CR4","first-page":"110","volume-title":"International Workshop on Pervasive Computing and Communication Security, PerSec 2005","author":"G. Avoine","year":"2005","unstructured":"Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash Based RFID Protocol. In: International Workshop on Pervasive Computing and Communication Security, PerSec 2005, Kauai Island, HI, USA, pp. 110\u2013114. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"13_CR5","volume-title":"ACM Symposium on Information, Computer and Communication Security, ASIACCS 2009","author":"J. Bringer","year":"2009","unstructured":"Bringer, J., Chabanne, H., Icart, T.: Efficient Zero-Knowledge Identification Schemes which respect Privacy. In: ACM Symposium on Information, Computer and Communication Security, ASIACCS 2009, Sydney, Australia. ACM Press, New York (2009)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Robust, Anonymous RFID Authentication with Constant Key-Lookup. Cryptology ePrint, Report 2007\/402 (2007)","DOI":"10.1145\/1368310.1368351"},{"issue":"2","key":"13_CR7","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1504\/IJACT.2008.021082","volume":"1","author":"M. Burmester","year":"2008","unstructured":"Burmester, M., de Medeiros, B., Motta, R.: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Journal of Applied Cryptography\u00a01(2), 79\u201390 (2008)","journal-title":"Journal of Applied Cryptography"},{"key":"13_CR8","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm","author":"M. Burmester","year":"2006","unstructured":"Burmester, M., Van Le, T., De Medeiros, B.: Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols. In: Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm, Baltimore, MD, USA, 2006, IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"13_CR9","unstructured":"Canard, S., Coisel, I.: Data Synchronization in Privacy-Preserving RFID Authentication Schemes. In: RFIDSec 2008, Budapest, Hungary (2008)"},{"key":"13_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-14992-4_3","volume-title":"1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices \u2013 WLC 2010","author":"S. Canard","year":"2010","unstructured":"Canard, S., Coisel, I., Etrog, J.: Lighten Encryption Schemes for Secure and Private RFID Systems. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Mitet, J.M., Sako, K., Seb\u00e9, F. (eds.) FC 2010 Workshops. LNCS, vol.\u00a06054, pp. 19\u201333. IFCA\/Springer, Heidelberg (2010)"},{"key":"13_CR11","unstructured":"Coisel, I.: Authentification et Anonymat \u00e0 Bas-Co\u00fbt: Mod\u00e9lisations et Protocoles, Th\u00e8se, Universit\u00e9 de Caen (2009)"},{"key":"13_CR12","volume-title":"Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm","author":"T. Dimitriou","year":"2005","unstructured":"Dimitriou, T.: A Lightweight RFID Protocol to protect against Traceability and Cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks, SecureComm, Athens, Greece. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"13_CR13","unstructured":"Girault, M., Juniot, L., Robshaw, M.: The feasibility of on-the-tag public key cryptography. In: RFIDSec 2007, Malaga, Spain (2007)"},{"key":"13_CR14","unstructured":"Instruments, T.: Animal Tracking, http:\/\/www.ti.com\/rfid\/shtml\/apps-anim-tracking.shtml"},{"key":"13_CR15","first-page":"342","volume-title":"International Conference on Pervasive Computing and Communications, PerCom 2007","author":"A. Juels","year":"2007","unstructured":"Juels, A., Weis, S.: Defining Strong Privacy for RFID. In: International Conference on Pervasive Computing and Communications, PerCom 2007, New York City, NY, USA, pp. 342\u2013347. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"13_CR16","first-page":"242","volume-title":"ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007","author":"T.V. Le","year":"2007","unstructured":"Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, pp. 242\u2013252. ACM, New York (2007)"},{"key":"13_CR17","first-page":"210","volume-title":"Conference on Computer and Communications Security, ACM CCS","author":"D. Molnar","year":"2004","unstructured":"Molnar, D., Wagner, D.: Privacy and Security in Library RFID: Issues, Practices, and Architectures. In: Pfitzmann, B., Liu, P. (eds.) Conference on Computer and Communications Security, ACM CCS, Washington, DC, USA, 2004, pp. 210\u2013219. ACM Press, New York (2004)"},{"key":"13_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-540-45146-4_36","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"P. Oechslin","year":"2003","unstructured":"Oechslin, P.: Making a faster cryptanalytic time-memory trade-off. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol.\u00a02729, pp. 617\u2013630. Springer, Heidelberg (2003)"},{"key":"13_CR19","unstructured":"Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to Privacy-Friendly Tags. In: RFID Privacy Workshop, MIT, MA, USA (2003)"},{"key":"13_CR20","unstructured":"Oren, Y., Feldhofer, M.: WIPR - a Public Key Implementation on Two Grains of Sand. In: RFIDSec 2008, Budapest, Hungary (2008)"},{"key":"13_CR21","volume-title":"Second ACM Conference on Wireless Network Security, WiSec 2009","author":"Y. Oren","year":"2009","unstructured":"Oren, Y., Feldhofer, M.: A Low-Resource Public-Key Identification Scheme for RFID Tags and Sensor Nodes. In: Second ACM Conference on Wireless Network Security, WiSec 2009, Zurich, Switzerland. ACM Press, New York (2009)"},{"key":"13_CR22","unstructured":"Organization, I.C.A.: Machine Readable Travel Documents, Doc 9303, Part1, Machine Readable Passports, 5 (edn.) (2003)"},{"key":"13_CR23","unstructured":"Semiconductors, N.: MIFARE Smartcards ICs, http:\/\/www.nxp.com\/products\/identification\/card_ics\/mifare"},{"key":"13_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79966-5_1","volume-title":"Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks","author":"T. Deursen van","year":"2008","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S.: Untraceability of RFID Protocols. In: Onieva, J.A., Sauveron, D., Chaumette, S., Gollmann, D., Markantonakis, K. (eds.) WISTP 2008. LNCS, vol.\u00a05019, pp. 1\u201315. Springer, Heidelberg (2008)"},{"key":"13_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-540-76900-2_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2007","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol.\u00a04833, pp. 68\u201387. Springer, Heidelberg (2007)"},{"key":"13_CR26","unstructured":"Verayo. Anti-Counterfeiting Solution for Pharma, Liquor, Cigarettes, Food, Luxury Products, http:\/\/www.verayo.com\/solution\/anti-counterfeiting.html"},{"key":"13_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S. Weis","year":"2004","unstructured":"Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 454\u2013469. Springer, Heidelberg (2004)"},{"key":"13_CR28","unstructured":"Wu, J., Stinson, D.: How to Improve Security and Reduce Hardware Demands of the WIPR RFID Protocol. In: IEEE International Conference on RFID \u2013 RFID 2009, Orlando, FL, USA (2009)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16822-2_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:49:11Z","timestamp":1606186151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16822-2_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642168215","9783642168222"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16822-2_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}