RFID Authentication Protocols based on Elliptic Curves: A Top-Down Evaluation Survey

Michael Hutter

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Search results

  • Finished

    CRYPTA - Cryptographic Protected Tags for new RFID Applications

    Posch, K., Feldhofer, M., Dominikus, S., Plos, T., Aigner, M. J., Hutter, M. & Schmidt, J.

    1/02/0931/03/11

    Project: Research project

  • EU - C@R - Collaboration Rural

    Schläffer, M., Medwed, M., Feldhofer, M., Hutter, M., Wolkerstorfer, J. & Aigner, M. J.

    1/09/0631/05/10

    Project: Research project

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Project: Research area