Limit search to available items
Book Cover
E-book
Author RFIDSec 2011 (2011 : Amherst, Mass.)

Title RFID: Security and privacy : 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised selected papers / Ari Juels, Christof Paar (eds.)
Published Berlin ; New York : Springer, ©2012

Copies

Description 1 online resource (x, 201 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 7055
LNCS sublibrary. SL 2, Programming and software engineering
Lecture notes in computer science ; 7055.
LNCS sublibrary. SL 2, Programming and software engineering.
Contents Title Page -- Preface -- Organization -- Table of Contents -- KLEIN: A New Family of Lightweight Block Ciphers -- Introduction -- Specification of KLEIN -- Structure of KLEIN -- The Round Transformation -- Security Analysis -- Linear and Differential Attacks -- Key Schedule Attacks -- Integral Attack -- Algebraic Attack -- Side-Channel Attack -- Performance -- Conclusion -- References -- Appendix -- The Hummingbird-2 Lightweight Authenticated Encryption Algorithm -- Introduction -- Description of Hummingbird-2
Nonlinear Functions f(x) and WD16(x, a, b, c, d)Initialization -- Encryption -- Authenticating Fixed-Length Unencrypted Associated Data -- Stream Cipher Mode: A Technique for Encoding Short Fixed-Length Fields -- Computing the Message Authentication Code -- Uniqueness Requirement for IVs and Keys -- Development and Analysis -- Structure of the Cipher -- S-Box Selection -- Differential Cryptanalysis -- Linear and Algebraic Cryptanalysis -- Implementation and Performance -- Microcontroller Software Implementations -- Hardware Implementations
HB2 Timing Compatibility with ISO 18000-6CConclusions -- References -- Test Vectors -- Elliptic Curve Cryptography on the WISP UHF RFID Tag -- Introduction -- Elliptic Curve Cryptography -- WISP UHF RFID Tag -- Hardware -- WISP Firmware -- Reader Setup and Programming Tools -- Implementation Details -- Elliptic Curve Cryptography Framework -- Finite-Field Arithmetic -- Elliptic-Curve Arithmetic -- Results -- Comparison with Related Work -- Conclusion -- References
Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES ImplementationIntroduction -- Background -- The AES Cipher -- Related Work -- Target Architecture -- Chosen Attack Methodology -- Experimental Results -- Measurement Setup -- Performing the Attacks -- Conclusions -- References -- Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation -- Introduction -- Related Work -- Contribution of This Paper -- SCA of Contactless Smartcards -- Measurement Setup
Measurement ProcessAnalog Processing -- Digital Processing -- Practical Results -- Example: Mifare DESFire MF3ICD40 -- Power Profiles of Different Contactless Smartcards -- Conclusion -- References -- Schematics -- A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions -- Introduction -- Distance Bounding Protocols -- Physically Unclonable Functions (PUFs) -- Adversary Capabilities -- Adversary Capabilities for PUFs -- Adversary Capabilities for Distance Bounding Protocols -- Our First Protocol -- Protocol Descriptions
Summary This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID
Analysis Computer science
Computer Communication Networks
Software engineering
Data protection
Data encryption (Computer science)
Computer software
Information Systems
Systems and Data Security
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Special Purpose and Application-Based Systems
Bibliography Includes bibliographical references and author index
Subject Radio frequency identification systems -- Congresses
Data encryption (Computer science) -- Congresses
Computer networks -- Security measures -- Congresses
Informatique.
Computer networks -- Security measures
Data encryption (Computer science)
Radio frequency identification systems
Genre/Form Conference papers and proceedings
Software.
Form Electronic book
Author Juels, Ari
Paar, Christof, 1963-
ISBN 9783642252860
3642252869
3642252850
9783642252853
Other Titles RFIDSec 2011