SLIDES |
TITLE |
PRESENTED BY |
slides-inv1 |
Invited Talk: Inventing the RFID Security Industry |
Melanie R. Rieback |
slides-1.1
paper-1.1 |
About Machine-Readable Travel Documents |
Serge Vaudenay |
slides-1.2
paper-1.2 |
Initial SRAM state as a Fingerprint and Source of True Random Numbers for RFID Tags |
Daniel E. Holcomb |
SLIDES |
TITLE |
PRESENTED BY |
|
Invited Talk
Title to be confirmed
|
Adi Shamir |
slides-2.1
paper-2.1 |
Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 standard |
Pedro Peris |
slides-2.2
paper-2.2 |
Attacks on the KeeLoq Block Cipher and Authentication Systems |
Andrey Bogdanov |
slides-2.3
paper-2.3 |
Breaking LMAP |
Krisztina Lója |
|
Invited Talk:
Title to be confirmed |
Abraham Adizes |
SLIDES |
TITLE |
PRESENTED BY |
slides-inv4 |
Invited Talk:Strong Crypto for Tiny RFID Tags --- Challenges and Design Issues |
Martin Feldhofer |
slides-3.1
paper-3.1 |
Maximalist Cryptography and Computation on the WISP UHF RFID Tag |
Hee Jin Chae |
slides-3.2
paper-3.2 |
The Feasibility of On-the-Tag Public Key Cryptography |
Marc Girault |
slides-3.3
paper-3.3 |
ASIC Implementations of the Block Cipher SEA for Constrained Applications |
François Macé |
SLIDES |
TITLE |
PRESENTED BY |
slides-inv5 |
Invited Talk
RFID Security Applied: Requirements to combat counterfeit products
|
Florian Michahelles |
slides-4.1
paper-4.1 |
Persistent Security for RFID |
Breno de Medeiros |
slides-4.2
paper-4.2 |
An Elliptic Curve and Zero Knowledge Based Forward Secure RFID Protocol |
S. Martínez |
slides-4.3
paper-4.3 |
A Simple and Cost-Effective RFID Tag-Reader Mutual Authentication Scheme |
Divyan M. Konidala |
slides-4.4
paper-4.4 |
Small-Footprint Block Cipher Design - How far can you go? |
Andrey Bogdanov |
slides-4.5
paper-4.5 |
Secret Shuffling: A Novel Approach to RFID Private Identification |
Mate Soos |