\n \n \n
\n
\n\n \n \n \n \n \n \n A note on the security of PAP.\n \n \n \n \n\n\n \n Naser, M.; Peris-Lopez, P.; Budiarto, R.; and Álvarez, B. R.\n\n\n \n\n\n\n
Comput. Commun., 34(18): 2248–2249. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/comcom/NaserPBA11,\n author = {Mu'awya Naser and\n Pedro Peris{-}Lopez and\n Rahmat Budiarto and\n Benjam{\\'{\\i}}n Ramos {\\'{A}}lvarez},\n title = {A note on the security of {PAP}},\n journal = {Comput. Commun.},\n volume = {34},\n number = {18},\n pages = {2248--2249},\n year = {2011},\n url = {https://doi.org/10.1016/j.comcom.2011.07.002},\n doi = {10.1016/J.COMCOM.2011.07.002},\n timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/comcom/NaserPBA11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Cryptanalysis of an EPC Class-1 Generation-2 standard compliant authentication protocol.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Hernandez-Castro, J. C.; Tapiador, J. E.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n
Eng. Appl. Artif. Intell., 24(6): 1061–1069. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/eaai/Peris-LopezHTL11,\n author = {Pedro Peris{-}Lopez and\n Julio C. Hernandez{-}Castro and\n Juan E. Tapiador and\n Jan C. A. van der Lubbe},\n title = {Cryptanalysis of an {EPC} Class-1 Generation-2 standard compliant\n authentication protocol},\n journal = {Eng. Appl. Artif. Intell.},\n volume = {24},\n number = {6},\n pages = {1061--1069},\n year = {2011},\n url = {https://doi.org/10.1016/j.engappai.2011.04.001},\n doi = {10.1016/J.ENGAPPAI.2011.04.001},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/eaai/Peris-LopezHTL11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A comprehensive RFID solution to enhance inpatient medication safety.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Orfila, A.; Mitrokotsa, A.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n
Int. J. Medical Informatics, 80(1): 13–24. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/ijmi/Peris-LopezOML11,\n author = {Pedro Peris{-}Lopez and\n Agust{\\'{\\i}}n Orfila and\n Aikaterini Mitrokotsa and\n Jan C. A. van der Lubbe},\n title = {A comprehensive {RFID} solution to enhance inpatient medication safety},\n journal = {Int. J. Medical Informatics},\n volume = {80},\n number = {1},\n pages = {13--24},\n year = {2011},\n url = {https://doi.org/10.1016/j.ijmedinf.2010.10.008},\n doi = {10.1016/J.IJMEDINF.2010.10.008},\n timestamp = {Fri, 21 Feb 2020 00:00:00 +0100},\n biburl = {https://dblp.org/rec/journals/ijmi/Peris-LopezOML11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Flaws on RFID grouping-proofs. Guidelines for future sound protocols.\n \n \n \n \n\n\n \n Peris-Lopez, P.; Orfila, A.; Hernandez-Castro, J. C.; and van der Lubbe, J. C. A.\n\n\n \n\n\n\n
J. Netw. Comput. Appl., 34(3): 833–845. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/jnca/Peris-LopezOHL11,\n author = {Pedro Peris{-}Lopez and\n Agust{\\'{\\i}}n Orfila and\n Julio C. Hernandez{-}Castro and\n Jan C. A. van der Lubbe},\n title = {Flaws on {RFID} grouping-proofs. Guidelines for future sound protocols},\n journal = {J. Netw. Comput. Appl.},\n volume = {34},\n number = {3},\n pages = {833--845},\n year = {2011},\n url = {https://doi.org/10.1016/j.jnca.2010.04.008},\n doi = {10.1016/J.JNCA.2010.04.008},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/jnca/Peris-LopezOHL11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n On the Key Schedule Strength of PRESENT.\n \n \n \n \n\n\n \n Castro, J. C. H.; Peris-Lopez, P.; and Aumasson, J.\n\n\n \n\n\n\n In García-Alfaro, J.; Navarro-Arribas, G.; Cuppens-Boulahia, N.; and di Vimercati, S. D. C., editor(s),
Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, volume 7122, of
Lecture Notes in Computer Science, pages 253–263, 2011. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/esorics/CastroPA11,\n author = {Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n Pedro Peris{-}Lopez and\n Jean{-}Philippe Aumasson},\n editor = {Joaqu{\\'{\\i}}n Garc{\\'{\\i}}a{-}Alfaro and\n Guillermo Navarro{-}Arribas and\n Nora Cuppens{-}Boulahia and\n Sabrina De Capitani di Vimercati},\n title = {On the Key Schedule Strength of {PRESENT}},\n booktitle = {Data Privacy Management and Autonomous Spontaneus Security - 6th International\n Workshop, {DPM} 2011, and 4th International Workshop, {SETOP} 2011,\n Leuven, Belgium, September 15-16, 2011, Revised Selected Papers},\n series = {Lecture Notes in Computer Science},\n volume = {7122},\n pages = {253--263},\n publisher = {Springer},\n year = {2011},\n url = {https://doi.org/10.1007/978-3-642-28879-1\\_17},\n doi = {10.1007/978-3-642-28879-1\\_17},\n timestamp = {Fri, 27 Dec 2019 21:19:57 +0100},\n biburl = {https://dblp.org/rec/conf/esorics/CastroPA11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n A Note on a Privacy-Preserving Distance-Bounding Protocol.\n \n \n \n \n\n\n \n Aumasson, J.; Mitrokotsa, A.; and Peris-Lopez, P.\n\n\n \n\n\n\n In Qing, S.; Susilo, W.; Wang, G.; and Liu, D., editor(s),
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings, volume 7043, of
Lecture Notes in Computer Science, pages 78–92, 2011. Springer\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/icics/AumassonMP11,\n author = {Jean{-}Philippe Aumasson and\n Aikaterini Mitrokotsa and\n Pedro Peris{-}Lopez},\n editor = {Sihan Qing and\n Willy Susilo and\n Guilin Wang and\n Dongmei Liu},\n title = {A Note on a Privacy-Preserving Distance-Bounding Protocol},\n booktitle = {Information and Communications Security - 13th International Conference,\n {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},\n series = {Lecture Notes in Computer Science},\n volume = {7043},\n pages = {78--92},\n publisher = {Springer},\n year = {2011},\n url = {https://doi.org/10.1007/978-3-642-25243-3\\_7},\n doi = {10.1007/978-3-642-25243-3\\_7},\n timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/icics/AumassonMP11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n AKARI-X: A pseudorandom number generator for secure lightweight systems.\n \n \n \n \n\n\n \n Martín, H.; Millán, E. S.; Entrena, L.; Castro, J. C. H.; and Peris-Lopez, P.\n\n\n \n\n\n\n In
17th IEEE International On-Line Testing Symposium (IOLTS 2011), 13-15 July, 2011, Athens, Greece, pages 228–233, 2011. IEEE Computer Society\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/iolts/MartinMECL11,\n author = {Honorio Mart{\\'{\\i}}n and\n Enrique San Mill{\\'{a}}n and\n Luis Entrena and\n Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n Pedro Peris{-}Lopez},\n title = {{AKARI-X:} {A} pseudorandom number generator for secure lightweight\n systems},\n booktitle = {17th {IEEE} International On-Line Testing Symposium {(IOLTS} 2011),\n 13-15 July, 2011, Athens, Greece},\n pages = {228--233},\n publisher = {{IEEE} Computer Society},\n year = {2011},\n url = {https://doi.org/10.1109/IOLTS.2011.5994534},\n doi = {10.1109/IOLTS.2011.5994534},\n timestamp = {Thu, 23 Mar 2023 00:00:00 +0100},\n biburl = {https://dblp.org/rec/conf/iolts/MartinMECL11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Studying the pseudo random number generator of a low-cost RFID tag.\n \n \n \n \n\n\n \n Merhi, M.; Castro, J. C. H.; and Peris-Lopez, P.\n\n\n \n\n\n\n In
2011 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2011, Sitges, Spain, September 15-16, 2011, pages 381–385, 2011. IEEE\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n \n doi\n \n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@inproceedings{DBLP:conf/rfidta/MerhiCP11,\n author = {Mohamad Merhi and\n Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n Pedro Peris{-}Lopez},\n title = {Studying the pseudo random number generator of a low-cost {RFID} tag},\n booktitle = {2011 {IEEE} International Conference on RFID-Technologies and Applications,\n {RFID-TA} 2011, Sitges, Spain, September 15-16, 2011},\n pages = {381--385},\n publisher = {{IEEE}},\n year = {2011},\n url = {https://doi.org/10.1109/RFID-TA.2011.6068666},\n doi = {10.1109/RFID-TA.2011.6068666},\n timestamp = {Sat, 30 Sep 2023 01:00:00 +0200},\n biburl = {https://dblp.org/rec/conf/rfidta/MerhiCP11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Cryptanalysis of Song's advanced smart card based password authentication protocol.\n \n \n \n \n\n\n \n Tapiador, J. E.; Hernandez-Castro, J. C.; Peris-Lopez, P.; and Clark, J. A.\n\n\n \n\n\n\n
CoRR, abs/1111.2744. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/corr/abs-1111-2744,\n author = {Juan E. Tapiador and\n Julio C. Hernandez{-}Castro and\n Pedro Peris{-}Lopez and\n John A. Clark},\n title = {Cryptanalysis of Song's advanced smart card based password authentication\n protocol},\n journal = {CoRR},\n volume = {abs/1111.2744},\n year = {2011},\n url = {http://arxiv.org/abs/1111.2744},\n eprinttype = {arXiv},\n eprint = {1111.2744},\n timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/corr/abs-1111-2744.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Cryptanalysis of Cho \\emphet al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems.\n \n \n \n \n\n\n \n Safkhani, M.; Peris-Lopez, P.; Castro, J. C. H.; Bagheri, N.; and Naderi, M.\n\n\n \n\n\n\n
IACR Cryptol. ePrint Arch.,331. 2011.\n
\n\n
\n\n
\n\n
\n\n \n \n
Paper\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n \n \n \n\n\n\n
\n
@article{DBLP:journals/iacr/SafkhaniPCBN11,\n author = {Masoumeh Safkhani and\n Pedro Peris{-}Lopez and\n Julio C{\\'{e}}sar Hern{\\'{a}}ndez Castro and\n Nasour Bagheri and\n Majid Naderi},\n title = {Cryptanalysis of Cho \\emph{et al.}'s Protocol, {A} Hash-Based Mutual\n Authentication Protocol for {RFID} Systems},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {331},\n year = {2011},\n url = {http://eprint.iacr.org/2011/331},\n timestamp = {Mon, 11 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/SafkhaniPCBN11.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n