“…(1) Tag selects three coupons denoted by (r i , To enhance security and feasibility, we set m = 24, that is to say, tag stores 24 coupons. In this case, C m 3 = 2024 is very close to 2048 = 2 11 , so we use 2048 instead of C m 3 , with which the module-2048 computation is just simple shifting operation. The value greater than 2024 and less than 2048 after modular operation is dropped.…”
Section: Coupons Updating Algorithmmentioning
confidence: 99%
“…The value greater than 2024 and less than 2048 after modular operation is dropped. Then the realization of pseudorandom number generator can do as follows: randomly select two 11-bit odd numbers a and τ 0 in each pseudorandom period, the recursion formula is τ s+1 = τ s × a mod 2 11 . To enhance randomness, we can randomly select a switching point b in a period to directly switch to the next period where b can be a pseudorandom number greater than 1024.…”
Section: Coupons Updating Algorithmmentioning
confidence: 99%
“…Nowadays, most of the existing RFID authentication schemes are still based on symmetric cryptographic technologies, such as hash function , stream cipher algorithms , and block cipher algorithms . But the symmetric key management is not flexible and become increasingly inefficient with the increase of users, which seriously restricts the application scale of RFID and the style of providing service, especially in the applications of supporting multiple readers (for example, customer, business, and supervisory agency all have the need to access one tag).…”
“…(1) Tag selects three coupons denoted by (r i , To enhance security and feasibility, we set m = 24, that is to say, tag stores 24 coupons. In this case, C m 3 = 2024 is very close to 2048 = 2 11 , so we use 2048 instead of C m 3 , with which the module-2048 computation is just simple shifting operation. The value greater than 2024 and less than 2048 after modular operation is dropped.…”
Section: Coupons Updating Algorithmmentioning
confidence: 99%
“…The value greater than 2024 and less than 2048 after modular operation is dropped. Then the realization of pseudorandom number generator can do as follows: randomly select two 11-bit odd numbers a and τ 0 in each pseudorandom period, the recursion formula is τ s+1 = τ s × a mod 2 11 . To enhance randomness, we can randomly select a switching point b in a period to directly switch to the next period where b can be a pseudorandom number greater than 1024.…”
Section: Coupons Updating Algorithmmentioning
confidence: 99%
“…Nowadays, most of the existing RFID authentication schemes are still based on symmetric cryptographic technologies, such as hash function , stream cipher algorithms , and block cipher algorithms . But the symmetric key management is not flexible and become increasingly inefficient with the increase of users, which seriously restricts the application scale of RFID and the style of providing service, especially in the applications of supporting multiple readers (for example, customer, business, and supervisory agency all have the need to access one tag).…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.