On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol

M Safkhani, N Bagheri, SK Sanadhya, M Naderi… - … Workshop, DPM 2011 …, 2012 - Springer
Authentication is one of the most basic and important cryptographic tasks. Mutual
authentication protocols play a crucial role on the security of RFID systems. In this paper, we …

Cryptanalysis of Cho\textit {et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

M Safkhani, P Peris-Lopez… - Cryptology ePrint …, 2011 - eprint.iacr.org
Radio frequency identification systems need protocols to provide confidentiality, user
privacy, mutual authentication and etc. These protocols should resist active and passive …

[HTML][HTML] Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol

M Safkhani, P Peris-Lopez… - … of Computational and …, 2014 - Elsevier
Radio frequency identification systems need secure protocols to provide confidentiality,
privacy protection, mutual authentication, etc. These protocols should resist active and …

CRYPTANALYSIS OF SULMA, AN ULTRA-LIGHTWEIGHT MUTUAL AUTHENTICATION PROTOCOL FOR LOW-COST RFID TAGS

M Azizi, N Bagheri - International Journal of UbiComp, 2011 - search.proquest.com
Recently, Kianersi et al. have proposed an ultra-lightweight mutual authentication protocol
for low-cost RFID tags, entitled SULMA. They have claimed that the SULMA protocol is …

A hybrid mutual authentication protocol for RFID

H Fernando, J Abawajy - … Networking, and Services: 7th International ICST …, 2012 - Springer
Out of the large number of RFID security protocols proposed in recent years none have
proven to be truly secure and the creation of a truly secure security protocol for systems …

Simple mutual authentication protocol for RFID

E Renault, S Boumerdassi - TENCON 2007-2007 IEEE Region …, 2007 - ieeexplore.ieee.org
In order to secure RFID systems as much as possible, most solutions do not only require
tags to authenticate themselves to readers, but they also require readers to authenticate …

Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems

Y Yang, J Gu, C Lv, Q Jiang, W Ma - IET Information Security, 2012 - IET
The authors describe three attacks against an efficient lightweight mutual authentication
protocol recently proposed by Kulseng et al. These attacks are unique as they are closely …

An enhanced authentication protocol for RFID systems

M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh… - IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we analyse the security of two mutual authentication protocols that have been
recently proposed by Gao et al.(IEEE Access, 7: 8376-8384, 2019), a hash-based protocol …

Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard

MH Habibi, M Gardeshi - 2011 8th International ISC …, 2011 - ieeexplore.ieee.org
The developing of RFID systems in sensitive applications like e-passport, e-health, credit
cards, and personal devices, makes it necessary to consider the related security and privacy …

EMAP: An efficient mutual-authentication protocol for low-cost RFID tags

P Peris-Lopez, JC Hernandez-Castro… - On the Move to …, 2006 - Springer
RFID tags are devices of very limited computational capabilities, which only have 250-3K
logic gates that can be devoted to security-related tasks. Many proposals have recently …