×
Our conclusions are even stronger since we can show that smaller hash functions like SHA-1, MD5 and MD4 are also less suitable for RFID tags than the AES. Our ...
Current standards and state-of-the-art low-power imple- mentation techniques favor the use of block ciphers like the Advanced Encryption. Standard (AES) instead ...
A Case Against Currently Used Hash. Functions in RFID Protocols ... Hash functions are conceptionally easy → mainly used by RFID.
We present a new architecture of Advanced Encryption Standard (AES) cryptographic hardware which can be used as cryptographic primitives supporting privacy and ...
A Case Against Currently Used Hash Functions in RFID Protocols. In R. Meersman, Z. Tari, & P. Herrero (Eds.), Workshop on RFID Security 2006 (pp. 109-122) ...
People also ask
In this paper we analyze some of the most common types of attack on RFID tags: unauthorized disabling, unauthorized cloning, unauthorized tracking, and response ...
Feldhofer, M., Rechberger, C.: A Case Against Currently Used Hash Functions in RFID Protocols. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 ...
A case against currently used hash functions in RFID protocols. There are more references available in the full text version of this article. Cited by ...
A Case Against Currently Used Hash Functions in RFID Protocols · Martin FeldhoferChristian Rechberger. Computer Science, Engineering. OTM Workshops. 2006. TLDR.
A Case Against Currently Used Hash Functions in RFID. Protocols. In First International Workshop on Information Security (IS'06), volume 4277 of. LNCS, pages ...