Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Скачиваний:
26
Добавлен:
02.04.2015
Размер:
1.95 Mб
Скачать

LIST OF FIGURES

.

An RFID Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

An RFID System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

Symmetric Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

Message Authentication Code . . . . . . . . . . . . . . . . . . . . . . .

 

.

Symmetric Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e IND-CPA Security Experiment. . . . . . . . . . . . . . . . . . . .

 

.

e IND-CCA Security Experiment. . . . . . . . . . . . . . . . . . .

 

.

e HB protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e HB+ protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e HB++ protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e HB protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e PUF-HB protocol . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e R -HB and HB protocols. . . . . . . . . . . . . . . . . . .

 

.

e Man-in-the-Middle Attack against R -HB and HB . . . . .

 

.

Plot of the function C(k)/k. . . . . . . . . . . . . . . . . . . . . . . . .

 

.

Basic challenge-response authentication protocol based on a MAC. . . .

 

.

Structure of S UASH . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e ProIP protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e MARPprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e MARPprotocol . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e Auth protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e YA-TRAP protocol. . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e YA-TRAP+ protocol. . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e O-TRAP protocol. . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

e RIPP-FS protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

 

 

 

.

e backward and forward untraceable RFID protocol. . . . . . . . . . .

 

 

.

e O-FRAP protocol. . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

.

e O-FRAKE protocol. . . . . . . . . . . . . . . . . . . . . . . . . . .

 

 

. Implications, separations and Equivalences in Vaudenay’s Privacy notions.

 

 

. Acorrect, secure, andWeakprivateRFIDauthenticationprotocolbased

 

 

 

on a pseudo-random function. . . . . . . . . . . . . . . . . . . . . . . .

 

 

. A weakly correct, secure, and Narrow-Destructive private RFID authen-

 

 

 

tication protocol in the random oracle model. . . . . . . . . . . . . . . .

 

 

. A correct, secure, Narrow-Strong, and Forward private RFID authenti-

 

 

 

cation protocol based on an IND-CCA public-key encryption scheme. .

 

 

.

Augmented protocol for RFID tags. . . . . . . . . . . . . . . . . . . . .

 

 

. Acorrect,secure,andStrong-privateRFIDauthenticationprotocolbased

 

 

 

on an IND-CPA and PA + plaintext-aware public-key encryption scheme.

 

 

.

A Public-Key Based Mutual Authentication Protocol. . . . . . . . . . . .

 

List of Figures

LIST OF TABLES

.

Complexity of Solving the LPN problem . . . . . . . . . . . . . . . . . .

 

.

Practical parameter sets for HB . . . . . . . . . . . . . . . . . . . . . .

 

.

Complexity of measuring a -bit window applied to the parameter set I

 

 

and II of HB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

 

.

Attack cost for the initial bit of the shared key for HB applied to t = m

 

.

Summary of the complexity of our attacks. . . . . . . . . . . . . . . . . .

 

.

^

 

Basic properties for computing R(V ). . . . . . . . . . . . . . . . . . . .