Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2015, Article ID 616182, 6 pages
http://dx.doi.org/10.1155/2015/616182
Research Article

Enhanced-Bivium Algorithm for RFID System

School of Information Security Engineering, Shanghai Jiaotong University, 800 Dongchuan Road, Shanghai 200240, China

Received 3 March 2015; Accepted 16 July 2015

Academic Editor: Anna Pandolfi

Copyright © 2015 Shiyong Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Finkenzeller, RFID-Handbook, Springer, Berlin, Germany; Carl Hanser, Munchen, Germany, 2nd edition, 2003.
  2. J.-S. Chou, Y. Chen, C.-L. Wu, and C.-F. Lin, “An efficient RFID mutual authentication scheme based on ECC,” Cryptology ePrint Archive Report 2011/418, IACR, 2011. View at Google Scholar
  3. M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, “Strong authentication for RFID systems using the AES algorithm,” in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES '04), Cambridge, Mass, USA, August 2004.
  4. T. A. Pham, M. S. Hasan, and H. Yu, “A RFID mutual authentication protocol based on AES algorithm,” in Proceedings of the UKACC International Conference on Control (CONTROL '12), pp. 997–1002, Cardiff, UK, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  5. E.-J. Yoon, “Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard,” Expert Systems with Applications, vol. 39, no. 1, pp. 1589–1594, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. H. Li, Y. Ping, W. Xuan, and L. Pang, “A novel hash-based RFID mutual authentication protocol,” in Proceedings of the 7th International Conference on Computational Intelligence and Security (CIS '11), pp. 774–778, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. T.-C. Yeh, Y.-J. Wang, T.-C. Kuo, and S.-S. Wang, “Securing RFID systems conforming to EPC class 1 generation 2 standard,” Expert Systems with Applications, vol. 37, no. 12, pp. 7678–7683, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Liu, “An efficient RFID authentication protocol for low-cost tags,” in Proceedings of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC '08), pp. 180–185, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. C. De Cannire and B. Preneel, “TRIVIUM specifications,” eSTREAM , ECRYPT stream Cipher Project 2005/030, April 2005, http://www.ecrypt.eu.org/stream. View at Google Scholar
  10. H. Raddum, Cryptanalytic Results on Trivium, 2007, http://www.ecrypt.eu.org/stream/papersdir/2006/039.ps.
  11. A. Maximov and A. Biryukov, “Two trivial attacks on TRIVIUM,” in SASC 2007: The State of the Art of Stream Ciphers, pp. 1–16, 2007. View at Google Scholar
  12. J. Borghoff, L. R. Knudsen, and M. Stolpe, “Bivium as a mixed-integer linear programming problem,” in Cryptography and Coding: 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15–17, 2009. Proceedings, M. G. Parker, Ed., vol. 5921 of Lecture Notes in Computer Science, pp. 133–152, Springer, Heidelberg, Germany, 2009. View at Publisher · View at Google Scholar
  13. Maplesoft, division of Waterloo Maple, Incorporation, http://www.maplesoft.com/.
  14. International Organization for Standardization, “Information technology—security techniques entity authentication mechanisms part 2: entity authentication using symmetric techniques,” ISO/IEC 9798-2, ISO/IEC, 1993. View at Google Scholar
  15. S. E. Sarma, S. A. Weis, and D. W. Engels, “RFID systems and security and privacy implications,” in Cryptographic Hardware and Embedded Systems—CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13–15, 2002 Revised Papers, vol. 2523 of Lecture Notes in Computer Science, pp. 454–470, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar