Cryptanalysis of AFMAP

M Safkhani, M Naderi, N Bagheri - IEICE Electronics Express, 2010 - jstage.jst.go.jp
AFMAP has sufficient resistance against desynchronization attack. However, in this paper, we
show that the AFMAP … follows: section 2 describes AFMAP. Our desynchronization attack is …

Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems

A Sadighian, R Jalili - 2009 Third International Conference on …, 2009 - ieeexplore.ieee.org
… In this section we propose two authentication protocols, called AFMAP, using a challenge …
As in AFMAP both of the R and the T use their own random value in their computations, any …

Security analysis of LMAP++, an RFID authentication protocol

M Safkhani, N Bagheri, M Naderi… - … Conference for Internet …, 2011 - ieeexplore.ieee.org
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems. In
The Third IEEE International Conference on Emerging Security Information, Systems and …

Cryptanalysis of AFMAP

S Masoumeh, N Majid, B Nasour - IEICE Electronics Express, 2010 - cir.nii.ac.jp
… Authentication or in short AFMAP. The complexity of attack is a few runs of the protocol and
the success probability is 1. To the best of our knowledge, this is the first attack on AFMAP. …

Cryptanalysis of some protocols for RFID systems

M Safkhani, M Naderi, N Bagheri… - Cryptology ePrint …, 2011 - eprint.iacr.org
In this paper we analyze the security of the mutual authentication and ownership transfer
protocols which have been recently proposed by Kulseng\textit {et al.} Our analysis …

Cryptanalysis of Cho\textit {et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

M Safkhani, P Peris-Lopez… - Cryptology ePrint …, 2011 - eprint.iacr.org
… In this paper we cryptanalysis a hash based RFID mutual authentication protocol which has
been recently proposed by Cho et al. More precisely, we present the following attacks on this …

Cryptanalysis and enhancement of two low cost RFID authentication protocols

H Jannati, A Falahati - arXiv preprint arXiv:1202.1971, 2012 - arxiv.org
Widespread attention is recently paid upon RFID system structure considering its ease of
deployment over an extensive range of applications. Due to its several advantages, many …

Tag impersonation attack on two RFID mutual authentication protocols

M Safkhani, N Bagheri, M Naderi… - … Reliability and Security, 2011 - ieeexplore.ieee.org
Security concerns of RFID systems engaged a lot of researchers to design and to cryptanalyze
RFID mutual authentication protocols. A suitable mutual authentication protocol for an …

Another Improvement of LMAP++: An RFID Authentication Protocol

A Huang, C Zhang, C Tang - Trustworthy Computing and Services …, 2014 - Springer
AFMAP: anonymous forward-secure mutual authentication protocols for RFID systems. In:
Third IEEE International Conference on Emerging Security Information, Systems and …

Improvements over extended LMAP+: RFID authentication protocol

JB Gurubani, H Thakkar, DR Patel - Trust Management VI: 6th IFIP WG …, 2012 - Springer
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems. In:
Third IEEE International Conference on Emerging Security Information, Systems and …