Naija et al., 2018 - Google Patents
Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tagNaija et al., 2018
- Document ID
- 18018906726562086426
- Author
- Naija Y
- Beroulle V
- Machhout M
- Publication year
- Publication venue
- Journal of Electronic Testing
External Links
Snippet
Abstract Radio Frequency IDentification (RFID) is used in many applications such as access control, transport, ticketing and contactless payment. The full-fledged High Frequency (HF) tags are the most popular RFID tags for these applications that require relatively high cost …
- 238000004458 analytical method 0 abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10297—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/077—Constructional details, e.g. mounting of circuits in the carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of the preceding main groups, e.g. automatic card files incorporating conveying and reading operations
- G06K2017/0035—Aspects not covered by other subgroups
- G06K2017/0045—Tracking objects or persons
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yang | Security Enhanced EMV‐Based Mobile Payment Protocol | |
| Peris-Lopez et al. | Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard | |
| US9961057B2 (en) | Securing a cryptographic device against implementation attacks | |
| US10567155B2 (en) | Securing a cryptographic device | |
| Naija et al. | Security enhancements of a mutual authentication protocol used in a HF full-fledged RFID tag | |
| Engels et al. | On security with the new Gen2 RFID security framework | |
| Garcia et al. | Wirelessly lockpicking a smart card reader | |
| Arbit et al. | A secure supply-chain RFID system that respects your privacy | |
| Tan | Practical attacks on the Mifare Classic | |
| Malina et al. | Assessment of cryptography support and security on programmable smart cards | |
| Younis et al. | ITPMAP: An improved three-pass mutual authentication protocol for secure RFID systems | |
| Gross et al. | PIONEER—A prototype for the Internet of Things based on an extendable EPC Gen2 RFID tag | |
| Peris-Lopez et al. | Providing stronger authentication at a low cost to RFID tags operating under the EPCglobal framework | |
| Hutter et al. | A trusted platform module for near field communication | |
| Dusart et al. | Lightweight authentication protocol for low-cost RFID tags | |
| RU2470470C2 (en) | Protecting execution of cryptographic computation | |
| Rahnama et al. | Securing RFID-based authentication systems using ParseKey+ | |
| Naija et al. | Electromagnetic attack test platform for validating rfid tag architectures | |
| Ayoub | A flexible ultralight hardware security module for EPC RFID tags | |
| Naija et al. | Low cost countermeasure at authentication protocol level against electromagnetic side channel attacks on RFID tags | |
| Huang et al. | Secured RFID mutual Authentication scheme for Mifare systems | |
| Henzl et al. | Modeling of contactless smart card protocols and automated vulnerability finding | |
| NAIJA | National Engineering School of SOUSSE | |
| Henzl et al. | A concept of automated vulnerability search in contactless communication applications | |
| 강민섭 | Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm |