2009
DOI: 10.1016/j.entcs.2009.07.037
|View full text |Cite
|
Sign up to set email alerts
|

Security of RFID Protocols – A Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 27 publications
0
19
0
Order By: Relevance
“…The desynchronization attack in [20], based on the modification of nr, cannot go by unnoticed in our protocol. Any modification results in a mismatch with h(ID, P nr ⊕ nt ) at step 2.…”
Section: Case 3: a Protocol Attacked Recentlymentioning
confidence: 99%
See 4 more Smart Citations
“…The desynchronization attack in [20], based on the modification of nr, cannot go by unnoticed in our protocol. Any modification results in a mismatch with h(ID, P nr ⊕ nt ) at step 2.…”
Section: Case 3: a Protocol Attacked Recentlymentioning
confidence: 99%
“…Finally, the tag updates to ID = h(ID', S nr ⊕ nt ) as well. The first attack launched in [20] was possible because the challenge and response of [19] were not related. Thus, an active attacker sends a nonce to the tag and gets a response that can be replayed later.…”
Section: Case 3: a Protocol Attacked Recentlymentioning
confidence: 99%
See 3 more Smart Citations