Back to Results
First PageMeta Content
Cryptographic hash functions / Block cipher / Radio-frequency identification / Stream cipher / Initialization vector / Symmetric-key algorithm / Authenticated encryption / VEST / Advanced Encryption Standard / Cryptography / Message authentication codes / Block cipher modes of operation


A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) Markku-Juhani O. Saarinen and Daniel Engels R EVERE S ECURITY 4500 Westgrove Drive, Suite 300, Addison, TX 75001, USA. [removed]
Add to Reading List

Document Date: 2013-01-05 09:33:40


Open Document

File Size: 193,60 KB

Share Result on Facebook

Company

GE / Hertz / STMicroelectronics / NXP Semiconductors / NSA / the AES / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Duplex Sponge / University of Waterloo / /

IndustryTerm

round-trip communications / lightweight sensor network / authentication protocol / supply chain / energy consumption peaks / multi-round authentication protocol / supply chain management / exit portal / Software designers / passive device / payment systems / decryption algorithm / air protocols / retail supply chain world / confidential communications channels / energy / Software implementation speed / communications protocols / cryptographic protocols / ultra-lightweight cryptographic protocol / reconfigurable hardware / basic security services / security services / encryption algorithms / consumer applications / encryption algorithm / authentication protocols / mutual authentication protocol / /

Organization

pp. / University of Waterloo / EPC / U.S. National Security Agency / Centre for Applied Cryptographic Research / IEEE Computer Society / /

Person

ROB SHAW / Daniel Engels / Serpent / /

Position

candidate / /

Product

RFID / Hummingbird-1 / Gen2 / Cryptographic sponge / /

Technology

Gen2 protocol / authentication protocol / encryption algorithms / encryption algorithm / communications protocols / block cipher / cloning / secret key / multi-round authentication protocol / ultra-lightweight cryptographic protocol / pdf / Encryption / 63 passive UHF RFID air protocols / cryptography / tweakable authenticated encryption / proposed secure HB2-128 Gen2 protocol / authentication protocols / finite state machine / Gossamer protocol / http / Radio Frequency / Hummingbird algorithm / decryption algorithm / M2 AP mutual authentication protocol / ultralightweight RFID authentication protocol / RFID technology / cryptographic protocols / stream cipher / /

URL

http /

SocialTag