2012 IEEE Conference on Open Systems 2012
DOI: 10.1109/icos.2012.6417641
|View full text |Cite
|
Sign up to set email alerts
|

Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Crypto backdoors happen when companies use encryption algorithms with inherent vulnerabilities on devices. Hackers can sniff such encryption algorithms like Heartbleed 37,56,58,74 System backdoor is a method of bypassing authentication by which hackers develop applications and spread on the Internet for spying purposes, for example, Trojan malware like NJRAT is used for spying 75 …”
Section: Defining Backdoormentioning
confidence: 99%
“…Crypto backdoors happen when companies use encryption algorithms with inherent vulnerabilities on devices. Hackers can sniff such encryption algorithms like Heartbleed 37,56,58,74 System backdoor is a method of bypassing authentication by which hackers develop applications and spread on the Internet for spying purposes, for example, Trojan malware like NJRAT is used for spying 75 …”
Section: Defining Backdoormentioning
confidence: 99%
“…LWC has the provision of long range transferring of encrypted data, robustness and high level of security. It is enriched with features such as ultra high speed transmission, minimal power consumption, threat prevention, green networking and many more [16] [17] [18].…”
Section: Security In Iot Environmentmentioning
confidence: 99%
“…In final stage architecture is implemented for proposed protocol. Proposed work was analyzed using five different types of word length (8,16,32,64 or 96 bits) with different number of gates for bitwise operations. The main characteristic of this protocol is that for tag identification no exhaustive search is required by reader in the back end database.…”
Section: Pedro Peris Lopez Et Al (2006)mentioning
confidence: 99%
“…Finally, in Section 6, the content of this paper is reviewed and the conclusion is presented. In this paper, the authors tried to make the structure clear as their previous published papers [36][37][38][39][40][41][42][43][44].…”
Section: Paper Organizationmentioning
confidence: 99%