Sciweavers

2 search results - page 1 / 1
» RFID Noisy Reader How to Prevent from Eavesdropping on the C...
Sort
View
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
13 years 10 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...
CARDIS
2006
Springer
159views Hardware» more  CARDIS 2006»
13 years 8 months ago
Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags
We propose a protocol that can be used between an RFID tag and a reader to exchange a secret without performing any expensive computation. Similarly to the famous blocker tag sugge...
Claude Castelluccia, Gildas Avoine