2017
DOI: 10.1007/s11277-017-4181-8
|View full text |Cite
|
Sign up to set email alerts
|

RFID Authentication Protocols Based on Error-Correcting Codes: A Survey

Abstract: International audienc

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…In the literature, there are several formal models [28] to validate the untraceability property. The model of Ouafi& Phan [29] is one of the well-known models based on the theory of the game.…”
Section: B Privacy Analysismentioning
confidence: 99%
“…In the literature, there are several formal models [28] to validate the untraceability property. The model of Ouafi& Phan [29] is one of the well-known models based on the theory of the game.…”
Section: B Privacy Analysismentioning
confidence: 99%
“…Code-based systems provide fast and secure encryption and decryption schemes but suffer from large public key sizes. Chikouche et al in [15] presented a survey on RFID authentication protocols that rely on variants of the McEliece system. The survey identified the protocols' common weaknesses and gave their performance evaluation.…”
Section: Related Workmentioning
confidence: 99%
“…Post-quantum cryptography (PQC) is resistant against quantum attacks and its computational complexity is of type NP-hard problem. Recently, there are several security protocols based on PQC have been presented, such as [24,8,9,7]. In the context of smart mobile technology, to secure user data and mobile communication, it is crucial to implement efficient cryptographic primitives.…”
Section: Introductionmentioning
confidence: 99%