Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993. ,
DOI : 10.1145/168588.168596
Authenticated Key Exchange Secure against Dictionary Attacks, Proceedings of Eurocrypt, pp.139-155, 2000. ,
DOI : 10.1007/3-540-45539-6_11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5384
An efficient forward private RFID protocol, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.43-53, 2009. ,
DOI : 10.1145/1653662.1653669
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher, Proceedings of Fast Software Encryption, pp.55-74, 2010. ,
DOI : 10.1007/978-3-642-13858-4_4
The Random Oracle Methodology, Proceedings of ACM STOC, 1998. ,
Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979. ,
DOI : 10.1016/0022-0000(79)90044-8
URL : http://doi.org/10.1016/0022-0000(79)90044-8
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control ,
URL : https://hal.archives-ouvertes.fr/hal-01573298
Revisiting DoS Attacks and Privacy in RFID-Enabled Networks, 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '09), Lecture Notes in Computer Science, vol.5304, pp.76-87, 2009. ,
Tradeoffs between Security and Efficiency, Proceedings of the RSA Conference, Cryptographers' Track, pp.318-332, 2008. ,
A New Framework for RFID Privacy, eprint archive, report no, 2010. ,
DOI : 10.1007/978-3-642-15497-3_1
URL : http://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1637&context=sis_research
A New Framework for RFID Privacy, Proceedings of Esorics 2010, pp.1-18, 2010. ,
DOI : 10.1007/978-3-642-15497-3_1
URL : http://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1637&context=sis_research
The Vision of Secure RFID, Proceedings of the IEEE, vol.95, issue.8, pp.1507-1508, 2007. ,
DOI : 10.1109/JPROC.2007.900324
An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, vol.3, issue.3, pp.34-43, 2005. ,
Efficient hash-chain based RFID privacy protection scheme, Proc. of the International Conference on Ubiquitous Computing Ubicomp Workshop Privacy: Current Status and Future Directions, 2004. ,
Mutual authentication in RFID, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.292-299, 2008. ,
DOI : 10.1145/1368310.1368352
Universally composable and forward-secure RFID authentication and authenticated key exchange, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.242-252, 2007. ,
DOI : 10.1145/1229285.1229319
On Privacy Models for RFID, Proceedings of Asiacrypt, Lecture Notes in Computer Science, pp.68-87, 2007. ,
Universal hashing and authentication codes, Designs, Codes and Cryptography, pp.369-380, 1994. ,
DOI : 10.1007/3-540-46766-1_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.5280
New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981. ,
DOI : 10.1016/0022-0000(81)90033-7
URL : http://doi.org/10.1016/0022-0000(81)90033-7