Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags

13Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Radio Frequency Identification (RFID) systems can be found in wide spread applications - from simple theft prevention over multi bit transponders up to complex applications involving contactless smartcards. This paper shows that the security gap between low-cost RFID Tags that only provide simple security features and contactless smartcards can be filled. It is examined how much energy a passive tag can gain from a magnetic field and which amount is needed by basic logic functions. The gate-equivalents of several cryptographic operations are then compared with the available energy and a conclusion is drawn if they are feasible for RFID tags. © IFIP International Federation for Information Processing 2006.

Cite

CITATION STYLE

APA

Lohmann, T., Schneider, M., & Ruland, C. (2006). Analysis of power constraints for cryptographic algorithms in mid-cost RFID tags. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3928 LNCS, pp. 278–288). https://doi.org/10.1007/11733447_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free