Go to Page # Page of 11
loading

Public Key for RFID: From Security Protocols to Silicon Implementation

 Ingrid Verbauwhede
  29th-Mar-2010
Description: Topics discussed include current RFID standards, security challenges RFID, design constraints, passive RFID tags, Solutions with Asymmetric-key Algorithms, Observation for RFID Protocols, EC based Security Processor, Optimization Approach, Register optimization: Point Addition/Doubling Algorithm, and much more.
Views: 2897
Domain: Electronics
Category: Mobile
weSRCH App on Apple
Contents:
Public Key for RFID:
from security protocols to silicon implementation

Ingrid Verbauwhede KULeuven � COSIC E-mail: ingrid.verbauwhede@esat.kuleuven.be Slide Acknowledgements: Yong Ki Lee, Lejla Batina
ECRYPT workshop � 1 Sept. 14, 2009

Challenge 1: security problems
2

Anti-cloning Privacy
Scalability

Schnorr Protocol Public key Crypto Okamoto Protocol EC-RAC Protocol

R ... See more

Recent Presentations

...
27 June, 2019
...
26 June, 2019
Risto Puhakka
25 June, 2019