Abstract is missing.
- KLEIN: A New Family of Lightweight Block CiphersZheng Gong, Svetla Nikova, Yee Wei Law. 1-18 [doi]
- The Hummingbird-2 Lightweight Authenticated Encryption AlgorithmDaniel W. Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith. 19-31 [doi]
- Elliptic Curve Cryptography on the WISP UHF RFID TagChristian Pendl, Markus Pelnar, Michael Hutter. 32-47 [doi]
- Exploring the Feasibility of Low Cost Fault Injection Attacks on Sub-threshold Devices through an Example of a 65nm AES ImplementationAlessandro Barenghi, Cédric Hocquet, David Bol, François-Xavier Standaert, Francesco Regazzoni, Israel Koren. 48-60 [doi]
- Side-Channel Analysis of Cryptographic RFIDs with Analog DemodulationTimo Kasper, David Oswald, Christof Paar. 61-77 [doi]
- A Novel RFID Distance Bounding Protocol Based on Physically Unclonable FunctionsSüleyman Kardas, Mehmet Sabir Kiraz, Muhammed Ali Bingöl, Hüseyin Demirci. 78-93 [doi]
- Security Analysis of Two Distance-Bounding ProtocolsMohammad Reza Sohizadeh Abyaneh. 94-107 [doi]
- An Automatic, Time-Based, Secure Pairing Protocol for Passive RFIDGeorge T. Amariucai, Clifford Bergman, Yong Guan. 108-126 [doi]
- BUPLE: Securing Passive RFID Communication through Physical Layer EnhancementsQi Chai, Guang Gong. 127-146 [doi]
- A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled DelegationAlbert Fernàndez-Mir, Rolando Trujillo-Rasua, Jordi Castellà-Roca, Josep Domingo-Ferrer. 147-162 [doi]
- ROTIV: RFID Ownership Transfer with Issuer VerificationKaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva. 163-182 [doi]
- Hierarchical ECC-Based RFID Authentication ProtocolLejla Batina, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede. 183-201 [doi]