2011
DOI: 10.1007/978-3-642-21518-6_30
|View full text |Cite
|
Sign up to set email alerts
|

Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Most of the previous UMAPs [1,5,6,9,12,[14][15][16][17][20][21][22] have similar pitfalls in their designs and are hence vulnerable against various cryptanalysis attacks [2,7,8,10,11,13,18,19,[23][24][25][26][27][28][29][30][31][32][33]. This raises the need of a new more sophisticated UMAP, which should overcome all the previously highlighted problems in cost effective manner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Most of the previous UMAPs [1,5,6,9,12,[14][15][16][17][20][21][22] have similar pitfalls in their designs and are hence vulnerable against various cryptanalysis attacks [2,7,8,10,11,13,18,19,[23][24][25][26][27][28][29][30][31][32][33]. This raises the need of a new more sophisticated UMAP, which should overcome all the previously highlighted problems in cost effective manner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The first attacks presented by Peris-Lopez et al [15] in 2010, were traceability and passive full disclosure of ID, which requires eavesdropping of an average of 250 sessions. In 2012, Avoine et al presented a passive full disclosure of ID on this protocol which requires eavesdropping of an average of 25 sessions [1].…”
Section: Historymentioning
confidence: 99%
“…Contrary to Yeh et al .’s claims, the scheme suffers from traceability and full disclosure attacks as shown by Peris‐López et al. ().…”
Section: Related Workmentioning
confidence: 99%