{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T05:22:12Z","timestamp":1761974532303,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642385292"},{"type":"electronic","value":"9783642385308"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38530-8_9","type":"book-chapter","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T01:03:00Z","timestamp":1369098180000},"page":"129-144","source":"Crossref","is-referenced-by-count":4,"title":["Lightweight Authentication Protocol for Low-Cost RFID Tags"],"prefix":"10.1007","author":[{"given":"Pierre","family":"Dusart","sequence":"first","affiliation":[]},{"given":"Sinaly","family":"Traor\u00e9","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Agarwal, A., Mitra, M.: RFID: Promises and Problems (April 2006)"},{"key":"9_CR2","unstructured":"Weis, S.A.: Rfid (radio frequency identification): Principles and applications"},{"issue":"1","key":"9_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MPRV.2006.13","volume":"5","author":"B. Nath","year":"2006","unstructured":"Nath, B., Reynolds, F., Want, R.: Rfid technology and applications. IEEE Pervasive Computing\u00a05(1), 22\u201324 (2006)","journal-title":"IEEE Pervasive Computing"},{"key":"9_CR4","unstructured":"\u00d6stman, H.: Rfid - 5 most common applications on the shop floor (2012), http:\/\/www.rfidarena.com\/2012\/12\/13\/rfid-%E2%80%93-5-most-common-applications-on-the-shop-floor.aspx"},{"key":"9_CR5","unstructured":"James, J.: Fda, companies test rfid tracking to prevent drug counterfeiting. AIDS Treat News\u00a0(417), 5\u20138 (2005)"},{"key":"9_CR6","unstructured":"Miles, S., Sarma, S., Williams, J.: RFID Technology and Applications. Cambridge University Press (2011)"},{"issue":"2","key":"9_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM\u00a021(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Feldhofer, M., Wolkerstorfer, J.: Strong crypto for rfid tags - a comparison of low-power hardware implementations. In: ISCAS, pp. 1839\u20131842. IEEE (2007)","DOI":"10.1109\/ISCAS.2007.378272"},{"key":"9_CR9","unstructured":"K\u00f6mmerling, O., Kuhn, M.G.: Design principles for tamper-resistant smartcard processors. In: Proceedings of the USENIX Workshop on Smartcard Technology, p. 2. USENIX Association (1999)"},{"key":"9_CR10","unstructured":"Poschmann, A.: Lightweight cryptography - cryptographic engineering for a pervasive world. IACR Cryptology ePrint Archive 2009, 516 (2009)"},{"issue":"5-6","key":"9_CR11","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/S0378-4754(98)00078-0","volume":"46","author":"P. Hellekalek","year":"1998","unstructured":"Hellekalek, P.: Good random number generators are (not so) easy to find. Math. Comput. Simul.\u00a046(5-6), 485\u2013505 (1998)","journal-title":"Math. Comput. Simul."},{"key":"9_CR12","unstructured":"NIST: Advanced encryption standard (aes), fips 197 (November 2001), http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"key":"9_CR13","unstructured":"Eastlake, D.E., Jones, P.E.: US Secure Hash Algorithm 1 (SHA1), http:\/\/www.ietf.org\/rfc\/rfc3174.txt?number=3174"},{"key":"9_CR14","unstructured":"Rivest, R.L.: The MD5 Message-Digest Algorithm (RFC 1321), http:\/\/www.ietf.org\/rfc\/rfc1321.txt?number=1321"},{"key":"9_CR15","unstructured":"Vajda, I., Butty\u00e1n, L.: Lightweight authentication protocols for low-cost rfid tags. In: 2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003 (October 2003)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Peris-Lopez, P., Hern, J.C., Tapiador, J.M.E., Ribagorda, A.: Lmap: A real lightweight mutual authentication protocol for low-cost rfid tags. In: Proc. of 2nd Workshop on RFID Security, Ecrypt, p. 06 (2006)","DOI":"10.1007\/11833529_93"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/11833529_93","volume-title":"Ubiquitous Intelligence and Computing","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.J.-P. (eds.) UIC 2006. LNCS, vol.\u00a04159, pp. 912\u2013923. Springer, Heidelberg (2006)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/11915034_59","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"P. Peris-Lopez","year":"2006","unstructured":"Peris-Lopez, P., Hernandez-Castro, J.C., Estevez-Tapiador, J.M., Ribagorda, A.: EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM Workshops 2006, Part I. LNCS, vol.\u00a04277, pp. 352\u2013361. Springer, Heidelberg (2006)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Defend, B., Fu, K., Juels, A.: Cryptanalysis of two lightweight rfid authentication schemes. In: PerCom Workshops, pp. 211\u2013216. IEEE Computer Society (2007)","DOI":"10.1109\/PERCOMW.2007.34"},{"key":"9_CR20","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-0-387-72367-9_10","volume-title":"New Approaches for Security, Privacy and Trust in Complex Environments","author":"T. Li","year":"2007","unstructured":"Li, T., Wang, G.: Security analysis of two ultra-lightweight RFID authentication protocols. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments. IFIP, vol.\u00a0232, pp. 109\u2013120. Springer, Boston (2007)"},{"key":"9_CR21","unstructured":"Lee, J., Yeom, Y.: Efficient rfid authentication protocols based on pseudorandom sequence generators. IACR Cryptology ePrint Archive 2008, 343 (2008)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Lo, N.W., Yeh, K.H.: De-synchronization attack on rfid authentication protocols. In: International Symposium on Information Theory and its Applications (ISITA), pp. 566\u2013570 (October 2010)","DOI":"10.1109\/ISITA.2010.5649726"},{"key":"9_CR23","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.entcs.2009.07.037","volume":"244","author":"T. Deursen van","year":"2009","unstructured":"van Deursen, T., Radomirovic, S.: Security of rfid protocols - a case study. Electr. Notes Theor. Comput. Sci.\u00a0244, 41\u201352 (2009)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"9_CR24","unstructured":"Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26. IEEE (2011)"},{"issue":"12","key":"9_CR25","doi-asserted-by":"publisher","first-page":"7678","DOI":"10.1016\/j.eswa.2010.04.074","volume":"37","author":"T.C. Yeh","year":"2010","unstructured":"Yeh, T.C., Wang, Y.J., Kuo, T.C., Wang, S.S.: Securing rfid systems conforming to epc class 1 generation 2 standard. Expert Syst. Appl.\u00a037(12), 7678\u20137683 (2010)","journal-title":"Expert Syst. Appl."},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-642-21040-2_18","volume-title":"Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication","author":"M.H. Habibi","year":"2011","unstructured":"Habibi, M.H., Alagheband, M.R., Aref, M.R.: Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol.\u00a06633, pp. 254\u2013263. Springer, Heidelberg (2011)"},{"key":"9_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/978-3-642-30955-7_4","volume-title":"Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems","author":"J.C. Hernandez-Castro","year":"2012","unstructured":"Hernandez-Castro, J.C., Peris-Lopez, P., Safkhani, M., Bagheri, N., Naderi, M.: Another fallen hash-based RFID authentication protocol. In: Askoxylakis, I., P\u00f6hls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol.\u00a07322, pp. 29\u201337. Springer, Heidelberg (2012)"},{"issue":"12","key":"9_CR28","doi-asserted-by":"publisher","first-page":"1375","DOI":"10.1109\/LCOMM.2011.103111.111816","volume":"15","author":"B. Song","year":"2011","unstructured":"Song, B., Hwang, J.Y., Shim, K.A.: Security improvement of an rfid security protocol of iso\/iec wd 29167-6. IEEE Communications Letters\u00a015(12), 1375\u20131377 (2011)","journal-title":"IEEE Communications Letters"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer (2002)","DOI":"10.1007\/978-3-662-04722-4"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Intel: Mcs-51 instruction set summary (1979)","DOI":"10.3109\/00016487909124936"},{"key":"9_CR31","first-page":"577","volume-title":"Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006","author":"P. Hamalainen","year":"2006","unstructured":"Hamalainen, P., Alho, T., Hannikainen, M., Hamalainen, T.D.: Design and implementation of low-area and low-power aes encryption hardware core. In: Proceedings of the 9th EUROMICRO Conference on Digital System Design, DSD 2006, pp. 577\u2013583. IEEE Computer Society, Washington, DC (2006)"},{"key":"9_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1007\/0-387-34799-2_31","volume-title":"Advances in Cryptology - CRYPTO 1988","author":"R. Forr\u00e9","year":"1990","unstructured":"Forr\u00e9, R.: The strict avalanche criterion: Spectral properties of boolean functions and an extended definition. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol.\u00a0403, pp. 450\u2013468. Springer, Heidelberg (1990)"},{"key":"9_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/3-540-39799-X_41","volume-title":"Advances in Cryptology","author":"A.F. Webster","year":"1986","unstructured":"Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 523\u2013534. Springer, Heidelberg (1986)"},{"key":"9_CR34","unstructured":"NIST: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications. NIST Special Publication 800-22rev1a (April 2010)"},{"key":"9_CR35","unstructured":"Multos: Multos developer\u2019s guide (2012)"},{"key":"9_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-540-72354-7_13","volume-title":"Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems","author":"T. Kasper","year":"2007","unstructured":"Kasper, T., Carluccio, D., Paar, C.: An embedded system for practical security analysis of contactless smartcards. In: Sauveron, D., Markantonakis, K., Bilas, A., Quisquater, J.-J. (eds.) WISTP 2007. LNCS, vol.\u00a04462, pp. 150\u2013160. Springer, Heidelberg (2007)"},{"key":"9_CR37","unstructured":"Schneier, B.: Rfid cards and man-in-the-middle attacks. Schneier Security Blog (2006)"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Hancke, G.P., Kuhn, M.G.: An rfid distance bounding protocol. In: SecureComm, pp. 67\u201373. IEEE (2005)","DOI":"10.1109\/SECURECOMM.2005.56"},{"key":"9_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"P.C. Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"9_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology - CRYPTO 1999","author":"P.C. Kocher","year":"1999","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol.\u00a01666, pp. 388\u2013397. Springer, Heidelberg (1999)"},{"key":"9_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-48285-7_33","volume-title":"Advances in Cryptology - EUROCRYPT 1993","author":"M. Matsui","year":"1994","unstructured":"Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.\u00a0765, pp. 386\u2013397. Springer, Heidelberg (1994)"},{"key":"9_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology - CRYPTO \u201990","author":"E. Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol.\u00a0537, pp. 2\u201321. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38530-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T10:43:06Z","timestamp":1746009786000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38530-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642385292","9783642385308"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38530-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}