M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, 1993.
DOI : 10.1145/168588.168596

M. Bellare, D. Pointcheval, and P. Rogaway, Authenticated Key Exchange Secure against Dictionary Attacks, Proceedings of Eurocrypt, pp.139-155, 2000.
DOI : 10.1007/3-540-45539-6_11

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.5384

C. Berbain, O. Billet, J. Etrong, and H. Gilbert, An efficient forward private RFID protocol, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.43-53, 2009.
DOI : 10.1145/1653662.1653669

O. Billet, J. Etrog, and H. Gilbert, Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher, Proceedings of Fast Software Encryption, pp.55-74, 2010.
DOI : 10.1007/978-3-642-13858-4_4

R. Canetti, O. Goldreich, and S. Halevi, The Random Oracle Methodology, Proceedings of ACM STOC, 1998.

J. L. Carter and M. N. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979.
DOI : 10.1016/0022-0000(79)90044-8

URL : http://doi.org/10.1016/0022-0000(79)90044-8

P. D. Arco, An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
URL : https://hal.archives-ouvertes.fr/hal-01573298

P. D. Arco, A. Scafuro, and I. Visconti, Revisiting DoS Attacks and Privacy in RFID-Enabled Networks, 5th International Workshop on Algorithmic Aspects of Wireless Sensor Networks (ALGOSENSORS '09), Lecture Notes in Computer Science, vol.5304, pp.76-87, 2009.

I. Damgård, M. Østergaard, and . Security, Tradeoffs between Security and Efficiency, Proceedings of the RSA Conference, Cryptographers' Track, pp.318-332, 2008.

R. Deng, Y. Li, A. Yao, M. Yung, and Y. Zhao, A New Framework for RFID Privacy, eprint archive, report no, 2010.
DOI : 10.1007/978-3-642-15497-3_1

URL : http://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1637&context=sis_research

R. Deng, Y. Li, M. Yung, and Y. Zhao, A New Framework for RFID Privacy, Proceedings of Esorics 2010, pp.1-18, 2010.
DOI : 10.1007/978-3-642-15497-3_1

URL : http://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=1637&context=sis_research

A. Juels, The Vision of Secure RFID, Proceedings of the IEEE, vol.95, issue.8, pp.1507-1508, 2007.
DOI : 10.1109/JPROC.2007.900324

A. Juels, R. Pappu, S. Garfinkel, and . Privacy, An Overview of Problems and Proposed Solutions, IEEE Security and Privacy, vol.3, issue.3, pp.34-43, 2005.

M. Ohkubo, K. Suzuki, and S. Kinoshita, Efficient hash-chain based RFID privacy protection scheme, Proc. of the International Conference on Ubiquitous Computing Ubicomp Workshop Privacy: Current Status and Future Directions, 2004.

R. Paise and S. Vaudenay, Mutual authentication in RFID, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.292-299, 2008.
DOI : 10.1145/1368310.1368352

T. Van-le, M. Burmester, and B. De-medeiros, Universally composable and forward-secure RFID authentication and authenticated key exchange, Proceedings of the 2nd ACM symposium on Information, computer and communications security , ASIACCS '07, pp.242-252, 2007.
DOI : 10.1145/1229285.1229319

S. Vaudenay, On Privacy Models for RFID, Proceedings of Asiacrypt, Lecture Notes in Computer Science, pp.68-87, 2007.

D. R. Stinson, Universal hashing and authentication codes, Designs, Codes and Cryptography, pp.369-380, 1994.
DOI : 10.1007/3-540-46766-1_5

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.5280

M. N. Wegman, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences, vol.22, issue.3, pp.265-279, 1981.
DOI : 10.1016/0022-0000(81)90033-7

URL : http://doi.org/10.1016/0022-0000(81)90033-7