• Publications
  • Influence
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
TLDR
We design a new authentication protocol named EC-RAC using EC (Elliptic Curve) cryptography to satisfy the requirements of RFID systems. Expand
  • 119
  • 15
  • PDF
Elliptic-Curve-Based Security Processor for RFID
TLDR
We present an architecture of a state-of-the-art processor for RFID tags with an elliptic curve (EC) processor over GF(2163). Expand
  • 247
  • 12
  • PDF
Untraceable RFID authentication protocols: Revision of EC-RAC
TLDR
In this paper we propose several authentication protocols that are all made of the same building blocks. Expand
  • 77
  • 10
  • PDF
Secure and Low-cost RFID Authentication Protocols
TLDR
In this paper we propose two RFID (Radio Frequency Identification) authentication protocols for secure and lowcost RFID systems that require good operational and security properties. Expand
  • 52
  • 9
  • PDF
Low-cost untraceable authentication protocols for RFID
TLDR
We repair three revised EC-RAC protocols of Lee, Batina and Verbauwhede and show that two of the improved authentication protocols are wide-strong privacy-preserving and one wide-weak privacy-Preserving; we present the search protocol, a novel scheme which allows for privately querying a particular tag, and proof its security properties. Expand
  • 100
  • 5
  • PDF
Privacy-Preserving ECC-Based Grouping Proofs for RFID
TLDR
We propose a privacy-preserving RFID grouping proof and demonstrate that it can easily be extended to use cases with more than two tags. Expand
  • 25
  • 5
  • PDF
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
TLDR
We extend the notion of public-key RFID authentication protocols and propose a privacy-preserving multi-party grouping-proof protocol which relies exclusively on the use of elliptic curve cryptography (ECC). Expand
  • 42
  • 3
  • PDF
Privacy Challenges in RFID Systems
TLDR
We give an overview of security solutions for RFID systems and discuss their security properties. Expand
  • 14
  • 2
Online Video Recommendation through Tag-Cloud Aggregation
TLDR
A framework for recommending online videos operates by constructing user profiles as an aggregate of tag clouds and generating recommendations according to similar viewing patterns. Expand
  • 39
  • 1
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
TLDR
The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Expand
  • 32
  • 1
  • PDF