{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T17:13:10Z","timestamp":1722186790393},"reference-count":21,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1587\/transcom.2020ebp3022","type":"journal-article","created":{"date-parts":[[2020,6,28]],"date-time":"2020-06-28T22:05:18Z","timestamp":1593381918000},"page":"13-19","source":"Crossref","is-referenced-by-count":2,"title":["Research on Ultra-Lightweight RFID Mutual Authentication Protocol Based on Stream Cipher"],"prefix":"10.23919","volume":"E104.B","author":[{"given":"Lijun","family":"GAO","sequence":"first","affiliation":[{"name":"Shenyang Aerospace University"}]},{"given":"Feng","family":"LIN","sequence":"additional","affiliation":[{"name":"Shenyang Aerospace University"}]},{"given":"Maode","family":"MA","sequence":"additional","affiliation":[{"name":"Shenyang Aerospace University"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S.A. Weis, S.E. Sarma, and R.L. Rivest, \u201cSecurity and privacy aspects of low-cost radio frequency identification systems,\u201d Proc. Security in Pervasive Computing, pp.201-212, 2004. 10.1007\/978-3-540-39881-3_18","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] S.E. Sarma, S.A. Weis, and D.W. Engels, \u201cRFID systems and security and privacy implications,\u201d Proc. International Workshop on Cryptographic Hardware and Embedded Systems, pp.454-469, 2002. 10.1007\/3-540-36400-5_33","DOI":"10.1007\/3-540-36400-5_33"},{"key":"3","doi-asserted-by":"publisher","unstructured":"[3] C. Lin, S.F. Zhao, and S.P. Chen, \u201cRFID secure protocol based on time-based hash chain,\u201d Advanced Materials Research, vol.980, pp.225-229, 2014. 10.4028\/www.scientific.net\/amr.980.225","DOI":"10.4028\/www.scientific.net\/AMR.980.225"},{"key":"4","unstructured":"[4] N.T. Courtois and T. Mourouzis, \u201cBlack-box collision attacks on the compression function of the GOST Hash function,\u201d Proc. International Conference on Security and Cryptography, pp.325-332, 2011. 10.5220\/0003525103250332"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] H.Y. Chien, \u201cSASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity,\u201d IEEE Trans. Dependable and Secure Comput., vol.4, no.4, pp.337-340, 2007. 10.1109\/tdsc.2007.70226","DOI":"10.1109\/TDSC.2007.70226"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] P. Peris-Lopez, J.C. Hernandez-Castro, and J.M.E. Tapiador, \u201cAdvances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol,\u201d Proc. International Workshop on Information Security Applications, pp.56-68, 2008. 10.1007\/978-3-642-00306-6_5","DOI":"10.1007\/978-3-642-00306-6_5"},{"key":"7","doi-asserted-by":"publisher","unstructured":"[7] H.M. Sun, W.C. Ting, and K.H. Wang, \u201cOn the security of Chien&apos;s ultralightweight RFID authentication protocol,\u201d IEEE Trans. Dependable and Secure Comput., vol.8, no.2, pp.315-317, 2009. 10.1109\/tdsc.2009.26","DOI":"10.1109\/TDSC.2009.26"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] P. D&apos;Arco and A. De Santis, \u201cOn ultralightweight RFID authentication protocols,\u201d IEEE Trans. Dependable and Secure Comput., vol.8, no.4, pp.548-563, 2010. 10.1109\/tdsc.2010.75","DOI":"10.1109\/TDSC.2010.75"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] E.G. Ahmed, E. Shaaban, and M. Hashem, \u201cLightweight mutual authentication protocol for low cost RFID tags,\u201d Proc. International Journal of Network Security &amp; Its Applications, vol.2, no.2, pp.27-37, 2010. 10.5121\/ijnsa.2010.2203","DOI":"10.5121\/ijnsa.2010.2203"},{"key":"10","unstructured":"[10] S. Piramuthu, \u201cHB and related lightweight authentication protocols for secure RFID tag\/reader authentication title,\u201d Proc. CollECTeR Europe, pp.247-256, 2006."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] A. Juels and S.A. Weis, \u201cAuthenticating pervasive devices with human protocols,\u201d Proc. CRYPTO, pp.293-308, 2005. 10.1007\/11535218_18","DOI":"10.1007\/11535218_18"},{"key":"12","unstructured":"[12] J. Bringer, H. Chabanne, and E. Dottax, \u201cHB++: A lightweight authentication protocol secure against some attacks,\u201d Proc. IEEE International Conference on Pervasive Services Workshop on Security, pp.28-33, 2006. 10.1109\/secperu.2006.10"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] H. Gilbert, M. Robshaw, and H. Sibert, \u201cActive attack against HB+: A provably secure lightweight authentication protocol,\u201d Electron. Lett., vol.41, no.21, pp.1169-1170, 2005. 10.1049\/el:20052622","DOI":"10.1049\/el:20052622"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, \u201cM<sup>2<\/sup>AP: A minimalist mutual-authentication protocol for low-cost RFID tags,\u201d Proc. 3rd International Conference Ubiquitous Intelligence and Computing, pp.912-923, 2006. 10.1007\/11833529_93","DOI":"10.1007\/11833529_93"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, \u201cEMAP: An efficient mutual authentication protocol for low-cost RFID tags,\u201d Proc. Move to Meaningful Internet Systems, pp.352-361, 2006. 10.1007\/11915034_59","DOI":"10.1007\/11915034_59"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] P. Peris-Lopez, J.C. Hernandez-Castro, and J.M. Estevez-Tapiador, \u201cLMAP: A real lightweight mutual authentication protocol for low-cost RFID tags,\u201d Proc. Workshop on RFID and Lightweight Crypto, pp.1-12, 2006.","DOI":"10.1007\/11833529_93"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] Y. Tian, G. Chen, and J. Li, \u201cA new ultralightweight RFID authentication protocol with permutation,\u201d IEEE Commun. Lett., vol.16, no.5, pp.702-705, 2012. 10.1109\/lcomm.2012.031212.120237","DOI":"10.1109\/LCOMM.2012.031212.120237"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] L. Gao, M. Ma, and Y. Shu, \u201cAn ultralightweight RFID authentication protocol with CRC and permutation,\u201d J. Netw. Comput. Appl., vol.41, pp.37-46, 2014. 10.1016\/j.jnca.2013.10.014","DOI":"10.1016\/j.jnca.2013.10.014"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] K. Singh and B.D.K. Patro, \u201cElliptic curve signcryption based security protocol for RFID,\u201d KSII Trans. Internet and Information Systems, vol.14, no.1, pp.344-365, 2020. 10.3837\/tiis.2020.01.019","DOI":"10.3837\/tiis.2020.01.019"},{"key":"20","unstructured":"[20] C.C. Lee and S.D. Chen, \u201cAn ultralightweight RFID authentication protocol with CRC and permutation,\u201d Future Generation Computer SystemsThe International Journal of eScience, pp.266-277, 2019."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] H. Xu, J. Ding, P. Li, F. Zhu, and R. Wang, \u201cA lightweight RFID mutual authentication protocol based on physical unclonable function,\u201d Sensors, vol.18, no.3, pp.1-19, 2018. 10.3390\/s18030760","DOI":"10.3390\/s18030760"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/1\/E104.B_2020EBP3022\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:59:42Z","timestamp":1704898782000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/1\/E104.B_2020EBP3022\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2020ebp3022","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}