2013 IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC 2013) 2013
DOI: 10.1109/icspcc.2013.6663868
|View full text |Cite
|
Sign up to set email alerts
|

A SHA-3 based RFID mutual authentication protocol and its implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…With regard to the Discrete Fourier Transform test, however, our results indicated that although the variability in all schemes considered is sufficiently high, there are a few sequences in which the periodic features are found to be higher than would be expected in a random sequence. Based on the STS results in Table 3 , we also observed that the sequences generated by our Butterfly approach perform at par to sequences generated using standard algorithms such as AES (Liu et al [ 20 ]), SHA-3 (Dong et al [ 12 ]), and the block-wise key update mechanism by XTEA (Zhu et al [ 13 ]).…”
Section: Evaluation and Resultsmentioning
confidence: 64%
See 4 more Smart Citations
“…With regard to the Discrete Fourier Transform test, however, our results indicated that although the variability in all schemes considered is sufficiently high, there are a few sequences in which the periodic features are found to be higher than would be expected in a random sequence. Based on the STS results in Table 3 , we also observed that the sequences generated by our Butterfly approach perform at par to sequences generated using standard algorithms such as AES (Liu et al [ 20 ]), SHA-3 (Dong et al [ 12 ]), and the block-wise key update mechanism by XTEA (Zhu et al [ 13 ]).…”
Section: Evaluation and Resultsmentioning
confidence: 64%
“…In comparison with other key generation schemes [ 12 , 13 , 20 ], we observe that the keys generated by our approach perform better in terms of similarity (or, ensuring dissimilarity). The keys generated in the proposal by Zhu et al [ 13 ] includes a scheme of updating the keys block-wise, which retains the other (non-updated) blocks of keys similar to the previous keys, increasing the average .…”
Section: Evaluation and Resultsmentioning
confidence: 77%
See 3 more Smart Citations