Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Security Analysis of Niu et al. Authentication and Ownership Management Protocol

    Over the past decade, besides authentication, ownership management protocols have been suggested to transfer or delegate the ownership of RFID tagged items. Recently, Niu et al. have proposed an authentication an...

    Masoumeh Safkhani, Hoda Jannati in Radio Frequency Identification and IoT Sec… (2017)

  2. No Access

    Chapter and Conference Paper

    Desynchronization and Traceability Attacks on RIPTA-DA Protocol

    Recently Gao et al. proposed a lightweight RFID mutual authentication protocol [3] to resist against intermittent position trace attacks and desynchronization attacks and called it RIPTA-DA. They also verified th...

    Nasour Bagheri, Praveen Gauravaram, Masoumeh Safkhani in Radio Frequency Identification (2013)

  3. No Access

    Chapter and Conference Paper

    On the Security of Two RFID Mutual Authentication Protocols

    In this paper, the security of two recent RFID mutual authentication protocols are investigated. The first protocol is a scheme proposed by Huang et al. [7] and the second one by Huang, Lin and Li [6]. We show th...

    Seyed Farhad Aghili, Nasour Bagheri, Praveen Gauravaram in Radio Frequency Identification (2013)

  4. No Access

    Chapter and Conference Paper

    On the Security of Tan et al. Serverless RFID Authentication and Search Protocols

    In this paper, we analyze the security of the mutual authentication and search protocols recently proposed by Tan et al. [20]. Our security analysis clearly highlights important security pitfalls in these. More p...

    Masoumeh Safkhani, Pedro Peris-Lopez in Radio Frequency Identification. Security a… (2013)

  5. Chapter and Conference Paper

    Another Fallen Hash-Based RFID Authentication Protocol

    In this paper, we scrutinize the security of an RFID protocol [9], which has been recently proposed, and show important vulnerabilities. Our first attack is a passive one that can disclose all secret informati...

    Julio Cesar Hernandez-Castro in Information Security Theory and Practice. … (2012)

  6. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tav-128 Hash Function

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit lig...

    Ashish Kumar, Somitra Kumar Sanadhya in Progress in Cryptology - INDOCRYPT 2010 (2010)