[1]
D. Ranasinghe, D. Engels, P. Cole, Low-cost RFID systems: Confronting security and privacy, Auto-ID Labs Research Workshop, (2004).
Google Scholar
[2]
Feldhofer, M. and Rechberger, C. (2006). A Case Against Currently Used Hash Functions in RFID Protocols. [C] In Meersman, R. et al. (Eds. ), On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops (p.372: 381). Berlin: Springer-Verlag.
DOI: 10.1007/11915034_61
Google Scholar
[3]
Aumasson J P, Henzen L, Meier W, et al. Quark: A lightweight hash [J]. Journal of cryptology, 2013, 26(2): 313-339.
DOI: 10.1007/s00145-012-9125-6
Google Scholar
[4]
A. Bogdanov, M. Knezevic, G. Leander, D. Toz, K. Varici, and I. Verbauwhede. SPONGENT: A lightweight hash function. In B. Preneel and T. Takagi, editors, CHES, volume 6917 of Lecture Notes in Computer Science, pages 312-325. Springer, (2011).
DOI: 10.1007/978-3-642-23951-9_21
Google Scholar
[5]
Huang, A.L.; Penzhorn, W.T.; cryptographic hash functions and low power techniques for embedded hardware[C]. Industrial Electronics, 2005. ISIE 2005. Proceedings of the IEEE International Symposium on. Vol. 4: 1789-1794.
DOI: 10.1109/isie.2005.1529204
Google Scholar
[6]
P.P. Deepthi, P.S. Sathidevi. Design implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions [J]. Computers & Security, 2009, 28(3-4): pp.229-241.
DOI: 10.1016/j.cose.2008.11.006
Google Scholar
[7]
Yeh TC, Wang YJ, Kuo TC, Securing RFID systems conforming to EPC Class 1 Generation 2 standard[J], expert system with application, 2010, 37(12): 7678-7683.
DOI: 10.1016/j.eswa.2010.04.074
Google Scholar
[8]
Mihir Bellare and Tadayoshi Kohno. Hash function balance and its impact on birthday attacks[C]. In Proceedings of EUROCRYP'04, volume 3027 of Lecture Notes in Computer Science. Springer-Verlag, (2004).
DOI: 10.1007/978-3-540-24676-3_24
Google Scholar
[9]
I. Damgärd: A design principle for hash functions[C]. In: Advances in Cryptology – CRYPTO 1989, Lecture Notes in Computer Science, Vol. 435, ed. by G. Brassard (Springer, Berlin Heidelberg 1989) p.416: 427.
DOI: 10.1007/0-387-34805-0_39
Google Scholar
[10]
R. Merkle: One way Hash Functions and DES[C]. In: Advances in Cryptology CRYPTO 1989, Lecture Notes in Computer Science, Vol. 435, ed. By G.
DOI: 10.1007/0-387-34805-0_40
Google Scholar
[11]
Min, Y.; Malaiya, Y.K.; Jin, B.; analysis of detection capability of parallel signature analyzers[J], IEEE Transactions on Computers, 1991, 40(9): p.1075: 1081.
DOI: 10.1109/12.83655
Google Scholar
[12]
Gao S J, Wang H J, Li H. Hash function based on multiple input signature analysis registers and the application in EPC C1G2 tag[C]/Communication Technology (ICCT), 2012 IEEE 14th International Conference on. IEEE, 2012: 841-844.
DOI: 10.1109/icct.2012.6511411
Google Scholar