2016
DOI: 10.1007/s11276-016-1323-y
|View full text |Cite
|
Sign up to set email alerts
|

SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(34 citation statements)
references
References 25 publications
0
34
0
Order By: Relevance
“…Based on the initial object-finding request, the SecureFind scheme can obtain the information the service provider. Based on the vulnerability of two published protocols RRAP [202] and RCIA [203], Luo et al [204] proposed recently a new ultra-lightweight mutual authentication protocol, which doesn't use any unbalanced operations like OR and AND.…”
Section: Rfid Authentication With Privacymentioning
confidence: 99%
“…Based on the initial object-finding request, the SecureFind scheme can obtain the information the service provider. Based on the vulnerability of two published protocols RRAP [202] and RCIA [203], Luo et al [204] proposed recently a new ultra-lightweight mutual authentication protocol, which doesn't use any unbalanced operations like OR and AND.…”
Section: Rfid Authentication With Privacymentioning
confidence: 99%
“…There are many hybrid nontriangular UMAPs available in the literature. In this subsection, the protocols under consideration are RFID Authentication Protocol with Permutation (RAPP) [4], RFID Authentication Protocol for Low cost Tags (RAPLT) [40], Robust Confidentiality Integrity and Authentication (RCIA) protocol [41], and Succinct and Lightweight Authentication Protocol (SLAP) [30].…”
Section: Umaps With Hybrid Nontriangular Functionmentioning
confidence: 99%
“…In this section, we propose an enhancement to the GAMTP (referred to as E-GAMTP) to overcome the vulnerabilities shown in the previous section. This enhancement is based on employing the conversion operation [34]. This is a stronger cryptographic bitwise function to resist the attack while, at the same time, avoiding addition of a high level of computational and power expensive operations.…”
Section: Enhanced Gamtp (E-gamtp)mentioning
confidence: 99%