{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T17:30:43Z","timestamp":1673631043708},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,12,25]],"date-time":"2008-12-25T00:00:00Z","timestamp":1230163200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1007\/s10623-008-9255-x","type":"journal-article","created":{"date-parts":[[2009,1,5]],"date-time":"2009-01-05T13:19:32Z","timestamp":1231161572000},"page":"195-210","source":"Crossref","is-referenced-by-count":5,"title":["Efficient RFID authentication protocols based on pseudorandom sequence generators"],"prefix":"10.1007","volume":"51","author":[{"given":"Jooyoung","family":"Lee","sequence":"first","affiliation":[]},{"given":"Yongjin","family":"Yeom","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,12,25]]},"reference":[{"key":"9255_CR1","unstructured":"Arnault F., Berger T.P., Lauradoux C.: Update on F-FCSR stream cipher, State of the Art of Stream Ciphers 2006 (SASC 2006), Workshop Record, pp. 267\u2013277 (2006)."},{"key":"9255_CR2","unstructured":"Avoine G., Oechslin P.: A scalable and provably secure hash based RFID protocol, Workshop on Pervasive Computing and Communication Security (PerSec) 2005 (2005)."},{"key":"9255_CR3","unstructured":"Babbage S., Dodd M.: The stream cipher MICKEY-128 2.0. eSTREAM, ECRYPT Stream Cipher Project (2006)."},{"key":"9255_CR4","unstructured":"De Canniere C., Preneel B.: TRIVIUM-a stream cipher construction inspired by block cipher design principles. eSTREAM, ECRYPT Stream Cipher Project, Report 2005\/030 (2005)."},{"key":"9255_CR5","doi-asserted-by":"crossref","unstructured":"Dimitriou T.: A lightweight RFID protocol to protect against traceability and cloning attacks. In: Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005 (2005).","DOI":"10.1109\/SECURECOMM.2005.4"},{"key":"9255_CR6","doi-asserted-by":"crossref","unstructured":"Feldhofer M., Dominicus S., Wolkerstorfer J.: Strong authentication for RFID systems using the AES algorithm. In: Proceedings of CHES \u201904, LNCS 3156, pp. 357\u2013370 (2004).","DOI":"10.1007\/978-3-540-28632-5_26"},{"issue":"1","key":"9255_CR7","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1049\/ip-ifs:20055006","volume":"152","author":"M. Feldhofer","year":"2005","unstructured":"Feldhofer M., Wolkerstorfer J., Rijmen V.: AES implementation on a grain of sand. Information Security, IEE Proc. 152(1), 13\u201320 (2005).","journal-title":"Information Security, IEE Proc."},{"issue":"4","key":"9255_CR8","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1145\/6490.6503","volume":"33","author":"O. Goldreish","year":"1986","unstructured":"Goldreish O., Goldwasser S., Micali S.: How to construct pseudorandom functions. J. ACM 33(4), 792\u2013807 (1986).","journal-title":"J. ACM"},{"key":"9255_CR9","unstructured":"Good T., Benaissa M.: Hardware results for selected stream cipher candidates, State of the Art of Stream Ciphers 2007 (SASC 2007), Workshop Record, pp. 191\u2013204 (2007)."},{"key":"9255_CR10","unstructured":"Gilbert H., Robshaw M.J.B., Seurin Y.: HB#: increasing the security and efficiency of HB+. In: Eurocrypt 2008, LNCS 4965, pp. 361\u2013378. Springer, Heidelberg (2008)."},{"key":"9255_CR11","doi-asserted-by":"crossref","unstructured":"Hell M., Johansson T., Meier W.: Grain-a stream cipher for constrained environments. eSTREAM, ECRYPT Stream Cipher Project (2006).","DOI":"10.1504\/IJWMC.2007.013798"},{"key":"9255_CR12","unstructured":"Henrici D., M\u00fcller P.: Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, Workshop on Pervasive Computing and Communication Security (PerSec) 2004 (2004)."},{"key":"9255_CR13","doi-asserted-by":"crossref","unstructured":"Hong D., Sung J., Hong S., Lim J., Lee S., Koo B.-S., Lee C., Chang D., Lee J., Jeong K., Kim H., Kim J., Chee S.: HIGHT: a new block cipher suitable for low-resource device. In: Proceedings of CHES \u201906, LNCS 4249, pp. 46\u201359 (2006).","DOI":"10.1007\/11894063_4"},{"key":"9255_CR14","doi-asserted-by":"crossref","unstructured":"Juels A., Weis S.A.: Authenticating pervasive devices with human protocols. In: Crypto 2005, LNCS 3126, pp. 293\u2013308. Springer, Heidelberg (2005).","DOI":"10.1007\/11535218_18"},{"key":"9255_CR15","doi-asserted-by":"crossref","unstructured":"Kats A., Shin J.S.: Parallel and concurrent security of the HB and HB+ protocols. In: Eurocrypt 2006, LNCS 4004, pp. 73\u201387. Springer, Heidelberg (2006).","DOI":"10.1007\/11761679_6"},{"key":"9255_CR16","doi-asserted-by":"crossref","unstructured":"van Le T., Burmester M., de Medeiros B.: Univerally composable and forward-secure RFID authentication and authenticated key exchange. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007) (2007).","DOI":"10.1145\/1229285.1229319"},{"key":"9255_CR17","unstructured":"Ohkubo M., Suzuki K., Kinoshita S.: Efficient hash-chain based RFID privacy protection scheme. In: International Conference on Ubiquitous Computing\u2014Ubicomp, Workshop Privacy: Current Status ans Future Directions (2004)."},{"key":"9255_CR18","doi-asserted-by":"crossref","unstructured":"Poschmann A., Leander G., Schramm K., Paar C.: New light-weight crypto algorithms for RFID. In: Proceedings of the 2007 IEEE International Symposium on Circuits and Systems (2007).","DOI":"10.1109\/ISCAS.2007.378273"},{"key":"9255_CR19","doi-asserted-by":"crossref","unstructured":"Rhee K., Kwak J., Kim S., Won D.: Challenge-response based RFID authentication protocol for distributed database environment. In: International Conference on Security in pervasive Computing (SPC) 2005 (2005).","DOI":"10.1007\/978-3-540-32004-3_9"},{"key":"9255_CR20","doi-asserted-by":"crossref","unstructured":"Tsudik G.: YA-TRAP: yet another trivial RFID authentication protocol. In: International Conference on Pervasive Computing and Communications (PerCom 2006) (2006).","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"9255_CR21","doi-asserted-by":"crossref","unstructured":"Weis S.A., Sarma S.E., Rivest R.L., Engels D.W.: Security and privacy aspects of low-cost radio frequency identification systems, security in pervasive computing. In: International Conference on Security in pervasive Computing (SPC) 2003 (2003).","DOI":"10.1007\/978-3-540-39881-3_18"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9255-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-008-9255-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-008-9255-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T15:58:25Z","timestamp":1559231905000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-008-9255-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,25]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,5]]}},"alternative-id":["9255"],"URL":"https:\/\/doi.org\/10.1007\/s10623-008-9255-x","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,12,25]]}}}