. Server, The server searches its database using M1, M2 and r1 as follows. i. It chooses t i from amongst the values t i ( new ) or t i ( old ) stored in the database, ii. It computes M'2 =f ti (r1 (M1 ? t i ))

S. Weis, Security and privacy in Radio Frequency Identification devices, Massachusetts Institute of Technology, 2003.

G. Avoine, Cryptography in Radio Frequency Identification and fair exchange protocols, 2005.

M. Habibi, M. Gardeshi, and M. Alaghband, Practical attacks on a RFID authentication protocol conforming to EPC Class 1 Generation 2 standard. arXiv preprint arXiv:1102, p.763, 2011.

B. Song and C. Mitchell, RFID authentication protocol for low-cost tags, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.140-147, 2008.
DOI : 10.1145/1352533.1352556

S. Cai, Y. Li, T. Li, and R. Deng, Attacks and improvements to an RIFD mutual authentication protocol and its extensions, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.51-58, 2009.
DOI : 10.1145/1514274.1514282

P. Rizomiliotis, E. Rekleitis, and S. Gritzalis, Security analysis of the song-mitchell authentication protocol for low-cost RFID tags, IEEE Communications Letters, vol.13, issue.4, pp.274-276, 2009.
DOI : 10.1109/LCOMM.2009.082117

B. Song, RFID Authentication Protocols using Symmetric Cryptography, 2009.

H. Chien and C. Chen, Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards, Computer Standards & Interfaces, vol.29, issue.2
DOI : 10.1016/j.csi.2006.04.004