Go to Page # Page of 11

Public Key for RFID: From Security Protocols to Silicon Implementation

 Ingrid Verbauwhede
Description: Topics discussed include current RFID standards, security challenges RFID, design constraints, passive RFID tags, Solutions with Asymmetric-key Algorithms, Observation for RFID Protocols, EC based Security Processor, Optimization Approach, Register optimization: Point Addition/Doubling Algorithm, and much more.
Views: 2857
Domain: Electronics
Category: Mobile
Public Key for RFID:
from security protocols to silicon implementation

Ingrid Verbauwhede KULeuven � COSIC E-mail: ingrid.verbauwhede@esat.kuleuven.be Slide Acknowledgements: Yong Ki Lee, Lejla Batina
ECRYPT workshop � 1 Sept. 14, 2009

Challenge 1: security problems

Anti-cloning Privacy

Schnorr Protocol Public key Crypto Okamoto Protocol EC-RAC Protocol

R ... See more

Recent Presentations

A Vision of Future Networks by Eric Hardouin

The future networks vision includes connecting large numbers of various devices and objects, efficient in energy and natural resource usage. 5G will enable disruptive services.

Eric Hardouin
19 April, 2019

RISC-V Foundation: From Hype to Ripe

RISC-V is an open and free ISA from Berkeley to the foundation. It is a fast Advancing Architecture. RISC-V started with hype but followed with healthy & fast-paced standard advanc

Charlie Su PhD
18 April, 2019
17 April, 2019