Lei et al., 2007 - Google Patents
Cryptanalysis of SPA ProtocolLei et al., 2007
- Document ID
- 6939580593460844237
- Author
- Lei H
- Cao T
- Publication year
- Publication venue
- 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System
External Links
Snippet
In this paper, we analyze the security vulnerabilities of SPA, a Strong and lightweight RFID private authentication protocol proposed by Li Lu et al. We present an effective de- synchronization attack against the protocol, which permanently disables the authentication …
- 230000003993 interaction 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tan et al. | Severless search and authentication protocols for RFID | |
Yang et al. | Mutual authentication protocol for low-cost RFID | |
Shao-hui et al. | Security analysis of RAPP an RFID authentication protocol based on permutation | |
Syamsuddin et al. | A survey of RFID authentication protocols based on hash-chain method | |
Zhuang et al. | A new ultralightweight RFID protocol for low-cost tags: R 2 AP | |
Bilal et al. | Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol | |
CN110381055B (en) | RFID system privacy protection authentication protocol method in medical supply chain | |
Rizomiliotis et al. | Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags | |
Deng et al. | Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol | |
Peng et al. | Privacy protection based on key-changed mutual authentication protocol in internet of things | |
Lee et al. | The tag authentication scheme using self-shrinking generator on RFID system | |
Chien | The study of RFID authentication protocols and security of some popular RFID tags | |
Halevi et al. | Tree-based HB protocols for privacy-preserving authentication of RFID tags | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Bilal et al. | Ultra-lightweight mutual authentication protocols: Weaknesses and countermeasures | |
Sadighian et al. | FLMAP: A fast lightweight mutual authentication protocol for RFID systems | |
Lei et al. | Cryptanalysis of SPA Protocol | |
Shi et al. | The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security | |
Lv et al. | Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems | |
Shao-hui et al. | Security analysis of two lightweight RFID authentication protocols | |
Dawoud et al. | HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation | |
Avoine et al. | Tree-based RFID authentication protocols are definitively not privacy-friendly | |
Wang et al. | PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards | |
Munilla et al. | Enhanced ownership transfer protocol for RFID in an extended communication model | |
Gao et al. | Low-cost RFID security protocols survey |