[1]
Z. Ding, J. Li, B. Feng: Reaserch on Hash-Based RFID Security Authenticaton Protocol. Journal of Computer Research and Development, 46(4), 2009, pp.583-592.
Google Scholar
[2]
G. Gaubatz, J. -P. Kaps, and B. Sunar: Public Key Cryptography in Sensor Networks- Revisited. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Heidelberg, Germany, August (2004).
DOI: 10.1007/978-3-540-30496-8_2
Google Scholar
[3]
J. Wolkerstorfer: Scaling ECC Hardware to a Minimum. In ECRYPT workshop - Cryptographic Advances in Secure Hardware - CRASH 2005, September 6-7 2005. invited talk.
Google Scholar
[4]
L. Batina, J. Guajardo, T. Kerins and et al: An Elliptic Curve Processor Suitable for RFID-Tags. Cryptology ePrint Archive, Report 2006/227, (2006).
Google Scholar
[5]
Daniel Hein: Elliptic-curve cryptography suitable for RFID systems. Master's thesis, IAIK, Technical University of Graz, 2008. http: /www. iaik. tugraz. at/teaching/11_diplomarbeiten/archive/hein. htm.
Google Scholar
[6]
D. Hein, J. Wolkerstorfer, and N. Felber: ECC is Ready for RFID – A Proof in Silicon. Selected Areas in Cryptography (SAC 2008), LNCS 5381, pp.401-413. Springer, (2009).
DOI: 10.1007/978-3-642-04159-4_26
Google Scholar
[7]
S. Martinez, M, Valls C. Roig and et al: A Secure Elliptic Curve-Based RFID Protocol. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24 (2): 309 – 318. Mar, (2009).
DOI: 10.1007/s11390-009-9226-3
Google Scholar
[8]
S. I. Ahamed, F. Rahman, and E. Hoque: ERAP: ECC based RFID Authentication Protocol. 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008, pp.219-225.
DOI: 10.1109/ftdcs.2008.20
Google Scholar
[9]
G. Godor, N. Giczi and S. I. Dr: Elliptic Curve Cryptography Based Mutual Authentication Protocol for Low Computational Capacity RFID Systems - Performance Analysis by Simulations. Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on Digital Object Identifier. pp.650-657.
DOI: 10.1109/wcins.2010.5541860
Google Scholar
[10]
D. Hankerson, A. J. Menezes, and S. Vanstone: Guide to Elliptic Curve Cryptography. Springer-Verlag Inc., Berlin, Germany, (2004).
Google Scholar
[11]
T. Okamoto, in: Provably Secure and Practical Identication Schemes and Corresponding Signature Schemes, edtied by Brickell, Advances in Cryptology CRYPTO'92, volume 740 of LNCS, pp.31-53. Springer, (1992).
DOI: 10.1007/3-540-48071-4_3
Google Scholar