Learn More
Flash memory are very popular storage device. Recently a lot of attention is paid to the data storage in flash memory. Data in flash memory should be distributed evenly among data blocks. If the number of writes in a data block is too high, it may cause damage of the block. Requirements for highly reliable storage systems include efficient algorithms to(More)
We present an authentication scheme designed for tiny and strictly constrained devices like RFID-tags. Authentication is based on the symmetric key shared between a tag and a reader. While a tag needs to perform only simple operations in order to authenticate: to pick n/2+b random values and then to compute XORs of some values, a reader needs to try 2 b(More)
  • 1