Description |
1 online resource (x, 201 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 7055 |
|
LNCS sublibrary. SL 2, Programming and software engineering |
|
Lecture notes in computer science ; 7055.
|
|
LNCS sublibrary. SL 2, Programming and software engineering.
|
Contents |
Title Page -- Preface -- Organization -- Table of Contents -- KLEIN: A New Family of Lightweight Block Ciphers -- Introduction -- Specification of KLEIN -- Structure of KLEIN -- The Round Transformation -- Security Analysis -- Linear and Differential Attacks -- Key Schedule Attacks -- Integral Attack -- Algebraic Attack -- Side-Channel Attack -- Performance -- Conclusion -- References -- Appendix -- The Hummingbird-2 Lightweight Authenticated Encryption Algorithm -- Introduction -- Description of Hummingbird-2 |
|
Nonlinear Functions f(x) and WD16(x, a, b, c, d)Initialization -- Encryption -- Authenticating Fixed-Length Unencrypted Associated Data -- Stream Cipher Mode: A Technique for Encoding Short Fixed-Length Fields -- Computing the Message Authentication Code -- Uniqueness Requirement for IVs and Keys -- Development and Analysis -- Structure of the Cipher -- S-Box Selection -- Differential Cryptanalysis -- Linear and Algebraic Cryptanalysis -- Implementation and Performance -- Microcontroller Software Implementations -- Hardware Implementations |
|
HB2 Timing Compatibility with ISO 18000-6CConclusions -- References -- Test Vectors -- Elliptic Curve Cryptography on the WISP UHF RFID Tag -- Introduction -- Elliptic Curve Cryptography -- WISP UHF RFID Tag -- Hardware -- WISP Firmware -- Reader Setup and Programming Tools -- Implementation Details -- Elliptic Curve Cryptography Framework -- Finite-Field Arithmetic -- Elliptic-Curve Arithmetic -- Results -- Comparison with Related Work -- Conclusion -- References |
|
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES ImplementationIntroduction -- Background -- The AES Cipher -- Related Work -- Target Architecture -- Chosen Attack Methodology -- Experimental Results -- Measurement Setup -- Performing the Attacks -- Conclusions -- References -- Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation -- Introduction -- Related Work -- Contribution of This Paper -- SCA of Contactless Smartcards -- Measurement Setup |
|
Measurement ProcessAnalog Processing -- Digital Processing -- Practical Results -- Example: Mifare DESFire MF3ICD40 -- Power Profiles of Different Contactless Smartcards -- Conclusion -- References -- Schematics -- A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions -- Introduction -- Distance Bounding Protocols -- Physically Unclonable Functions (PUFs) -- Adversary Capabilities -- Adversary Capabilities for PUFs -- Adversary Capabilities for Distance Bounding Protocols -- Our First Protocol -- Protocol Descriptions |
Summary |
This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Software engineering |
|
Data protection |
|
Data encryption (Computer science) |
|
Computer software |
|
Information Systems |
|
Systems and Data Security |
|
Algorithm Analysis and Problem Complexity |
|
Management of Computing and Information Systems |
|
Special Purpose and Application-Based Systems |
Bibliography |
Includes bibliographical references and author index |
Subject |
Radio frequency identification systems -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Informatique.
|
|
Computer networks -- Security measures
|
|
Data encryption (Computer science)
|
|
Radio frequency identification systems
|
Genre/Form |
Conference papers and proceedings
|
|
Software.
|
Form |
Electronic book
|
Author |
Juels, Ari
|
|
Paar, Christof, 1963-
|
ISBN |
9783642252860 |
|
3642252869 |
|
3642252850 |
|
9783642252853 |
|