C. Eigeartaigh, Pairing computation on hyperelliptic curves of genus 2, 2006.

G. Ateniese, J. Camenisch, and B. D. Medeiros, Untraceable RFID tags via insubvertible encryption, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.92-101, 2005.
DOI : 10.1145/1102120.1102134

E. O. Blass, K. Elkhiyaoui, and R. Molva, Tracker: Security and privacy for RFIDbased supply chains, Cryptology ePrint Archive, vol.219, 2010.

E. O. Blass, K. Elkhiyaoui, and R. Molva, Tracker : security and privacy for RFID-based supply chains, NDSS, 2011.

A. Boldyreva, C. Gentry, A. O. Neill, and D. H. Yum, Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.276-285, 2007.
DOI : 10.1145/1315245.1315280

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, A survey of two signature aggregation techniques, In CryptoBytes, vol.6, issue.2, 2003.

D. Boneh, B. Lynn, and H. Shacham, Short signatures from the weil pairing, ASIACRYPT, pp.514-532, 2001.
DOI : 10.1007/3-540-45682-1_30

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.1494

S. Cai, Y. Li, T. Li, and R. H. Deng, Attacks and improvements to an RIFD mutual authentication protocol and its extensions, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.51-58, 2009.
DOI : 10.1145/1514274.1514282

D. Dolev and A. C. Yao, On the security of public key protocols, 1981.

J. Gattorna, Living Supply Chains. Pearson Education, 2006.

P. Golle, M. Jakobsson, A. Juels, and P. Syverson, Universal Re-encryption for Mixnets, CT?RSA, pp.163-178, 2004.
DOI : 10.1007/978-3-540-24660-2_14

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.3351

A. Juels, Minimalist cryptography for low-cost RFID tags, SCN, pp.149-164, 2004.
DOI : 10.1007/978-3-540-30598-9_11

A. Juels, R. Pappu, and B. Parno, Unidirectional Key Distribution Across Time and Space with Applications to RFID Security, USENIX, pp.75-90, 2008.

H. Krawczyk, M. Bellare, and R. Canetti, RFC2104 -HMAC:Keyed-Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.383.2086

M. Langheinrich and R. Marti, Practical Minimalist Cryptography for RFID Privacy, IEEE Systems Journal, vol.1, issue.2, pp.115-128, 2007.
DOI : 10.1109/JSYST.2007.907683

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.7023

M. Langheinrich and R. Marti, RFID Privacy Using Spatially Distributed Shared Secrets, UCS, pp.1-16, 2007.
DOI : 10.1007/978-3-540-76772-5_1

Y. Li and X. Ding, Protecting RFID communications in supply chains, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.234-241, 2007.
DOI : 10.1145/1229285.1229318

D. Molnar and D. Wagner, Privacy and security in library RFID, Proceedings of the 11th ACM conference on Computer and communications security , CCS '04, pp.210-219, 2004.
DOI : 10.1145/1030083.1030112

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.5470

G. Noubir, K. Vijayan, and H. J. Nussbaumer, Signature-based method for runtime fault detection in communication protocols, Computer Communications, vol.21, pp.21-26, 1998.

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.
DOI : 10.1137/0108018

B. Schneier, Description of a new variable-length key, 64-bit block cipher (blowfish ) In Fast Software Encryption, pp.191-204, 1994.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

B. Song and C. J. Mitchell, RFID authentication protocol for low-cost tags, Proceedings of the first ACM conference on Wireless network security , WiSec '08, pp.140-147, 2008.
DOI : 10.1145/1352533.1352556

D. Zanetti, L. Fellmann, and S. Capkun, Privacy-preserving Clone Detection for RFIDenabled Supply Chains, IEEE RFID, pp.37-44, 2010.
DOI : 10.1109/rfid.2010.5467257

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.458.4637