Disclaimer: This page refers to an external person. It only lists all the interactions between this person and the Crypto Group. Validity or accuracy of the following information is thus not guaranteed in any way.
Seminars given
April 24, 2007 - RFID Primer and Foretaste of Security and Privacy
by Gildas Avoine
Abstract: | During my stay in the Crypto Group of UCLouvain, my research activities
will focus on the security of the RFID systems. I will especially
address the security issues related to the biometric passports, and I
will also consider the relay attacks. During these 2-month sojourn, I
will give several talks about security and privacy in RFID systems. The
first one of this series will consist of a general introduction to RFID
and its security and privacy-related problems, and the following ones
will focus on more specific problems.
RFID consists in remotely identifying objects or persons that carry a
small transponder, called tag. Such tags offer limited capabilities and
so require specific cryptographic designs for "securing" the system.
Because RFID becomes a ubiquitous technology, privacy is also a matter
of concern. After an introduction to the technology itself, the existing
and the future applications, I will describe the main security and
privacy issues that appear in RFID systems. |
Publications
Gildas Avoine, Iwen Coisel, and Tania Martin. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols, In S.B. Ors Yalcin, editor(s), Workshop on RFID Security -- RFIDSec'10, Volume 6370 of Lecture Notes in Computer Science (LNCS), pages 138--157, Spinger, June 2010 PDF BibTeX
Chong Hee Kim, and Gildas Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks, The 8th International Conference on Cryptology and Network Security - CANS2009, Volume 5888 of Lecture Notes in Computer Science, pages 119-133, Springer, December 2009 BibTeX
Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol, The 11th International Conference on Information Security and Cryptology - ICISC 2008, Volume 5461 of Lecture Notes in Computer Science, pages 98-115, Springer-Verlag, December 2008 BibTeX
Copyright Notice
(
click here to expand/retract)
Some material that is available from this page is copyrighted.
IACR Copyright Notice: Permission is granted for a user to display all
material at this site, to copy the material onto a single computer, and to make
print copies of the material for personal use only. All other rights are
retained by the International Association for Cryptologic Research. In
particular, any other copying, other redistribution, or any commercial use of
the material requires the permission of the publisher, which may be requested
by contacting the International Association for Cryptologic Research.
IEEE Copyright Notice: This material is presented to ensure timely
dissemination of scholarly and technical work. Copyright and all rights therein
are retained by authors or by other copyright holders. All persons copying this
information are expected to adhere to the terms and constraints invoked by each
author's copyright. In most cases, these works may not be reposted without the
explicit permission of the copyright holder.
ACM Copyright Notice: Copyright © 1999 by the Association for
Computing Machinery, Inc. Permission to make digital or hard copies of part of
this work for personal or classroom use is granted without fee provided that
copies are not made or distributed for profit or commercial advantage and that
copies bear this notice and the full citation on the first page or intial
screen of the document. Copyrights for components of this work owned by others
than ACM must be honored. Abstracting with credit is permitted. To copy
otherwise, to republish, to post on servers, or to redistribute to lists,
requires prior specific permission and/or a fee. Request permissions from
Publications Dept., ACM Inc., fax +1 (212) 869-0481, or
permissions@acm.org.
Springer-Verlag LNCS Copyright Notice: The copyright of these
contributions has been transferred to Springer-Verlag Berlin Heidelberg New
York. The copyright transfer covers the exclusive right to reproduce and
distribute the contribution, including reprints, translations, photographic
reproductions, microform, electronic form (offline, online), or any other
reproductions of similar nature. Online available from Springer-Verlag LNCS
series.