Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag

Thomas Plos, Martin Feldhofer

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Proceedings
Place of PublicationBerlin / Heidelberg
PublisherSpringer
Pages426-435
Publication statusPublished - 2011
EventSecurity and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011: ICST 2011 - London, United Kingdom
Duration: 7 Sept 20119 Sept 2011

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecomm. (LNICST)
PublisherSpringer

Conference

ConferenceSecurity and Privacy in Communication Networks - 7th International ICST Conference, SecureComm 2011
Country/TerritoryUnited Kingdom
CityLondon
Period7/09/119/09/11

Fields of Expertise

  • Information, Communication & Computing

Treatment code (Nähere Zuordnung)

  • Application
  • CRYPTA - Cryptographic Protected Tags for new RFID Applications

    Posch, K., Feldhofer, M., Dominikus, S., Plos, T., Aigner, M. J., Hutter, M. & Schmidt, J.

    1/02/0931/03/11

    Project: Research project

  • EU - ECRYPT II - European network of excellence in cryptology - Phase II

    Schmidt, J., Nad, T., Kirschbaum, M., Feldhofer, M., Schläffer, M., Aigner, M. J., Rechberger, C., Lamberger, M., Tillich, S., Medwed, M., Hutter, M., Rijmen, V., Mendel, F. & Posch, R.

    1/08/0831/07/12

    Project: Research project

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area

Cite this