Chapter 16 - Towards Secure and Privacy-enhanced RFID Systems
Figure 16.1 Common attacks to the information flow
Figure 16.2 Relay attack
Figure 16.3 Operation of a Linear Feedback Shift Register of length L
Figure 16.4 AES Schematic description of AES round steps on the 4 X 4 state matrix of bytes. SubBytes and AddRoundKey are applied to each matrix entry individually
Figure 16.5 Trivium: Bit extraction
Figure 16.6 Trivium: Update of the second register
Figure 16.7 Operation of the Grain stream cipher
Figure 16.8 The elliptic curve E: y2+y=x3 - x over the real numbers The elliptic curve E: y2+y=x3 - x over the real numbers; illustration of point addition P+Q and multiplication 2 * T