Our conclusions are even stronger since we can show that smaller hash functions like SHA-1, MD5 and MD4 are also less suitable for RFID tags than the AES. Our ...
Current standards and state-of-the-art low-power imple- mentation techniques favor the use of block ciphers like the Advanced Encryption. Standard (AES) instead ...
A Case Against Currently Used Hash. Functions in RFID Protocols ... Hash functions are conceptionally easy → mainly used by RFID.
We present a new architecture of Advanced Encryption Standard (AES) cryptographic hardware which can be used as cryptographic primitives supporting privacy and ...
A Case Against Currently Used Hash Functions in RFID Protocols. In R. Meersman, Z. Tari, & P. Herrero (Eds.), Workshop on RFID Security 2006 (pp. 109-122) ...
People also ask
What is a hash function in RFID?
What are the security issues with RFID?
What is RFID jamming denial of service?
In this paper we analyze some of the most common types of attack on RFID tags: unauthorized disabling, unauthorized cloning, unauthorized tracking, and response ...
Feldhofer, M., Rechberger, C.: A Case Against Currently Used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 ...
A case against currently used hash functions in RFID protocols. There are more references available in the full text version of this article. Cited by ...
A Case Against Currently Used Hash Functions in RFID Protocols · Martin FeldhoferChristian Rechberger. Computer Science, Engineering. OTM Workshops. 2006. TLDR.
A Case Against Currently Used Hash Functions in RFID. Protocols. In First International Workshop on Information Security (IS'06), volume 4277 of. LNCS, pages ...