Conferences

    • [PDF] M. Safkhani, N. Bagheri, P. Peris-Lopez, and J. Tapiador, “Employing a secure cipher does not guarantee the security of rfid protocols,” in Iscturkey, 2014.
      [Bibtex]
      @INPROCEEDINGS{c32saf2014,
      year={2014},
      booktitle={ISCTURKEY},
      volume={},
      series={},
      doi={},
      title={Employing a Secure Cipher Does Not guarantee the Security of RFID Protocols},
      url={},
      publisher={},
      keywords={},
      author={Safkhani, M. and Bagheri, N. and Peris-Lopez, P. and Tapiador, J.E.}\ref{\pageref{•}},
      pages={},
      }
    • [PDF] J. L. Hernandez-Ardieta, D. Santos, P. Parra, J. E. Tapiador, P. Peris-Lopez, J. Lopez, and G. Fernandez Navarrete, “An intelligent and adaptive live simulator: a new concept for cybersecurity training.,” in An intelligent and adaptive live simulator: a new concept for cybersecurity training., 2014.
      [Bibtex]
      @INPROCEEDINGS{c33ardietatpn2014,
      year={2014},
      booktitle={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.},
      volume={},
      series={},
      doi={},
      title={An Intelligent and Adaptive Live Simulator: A New Concept for Cybersecurity Training.},
      url={},
      publisher={},
      keywords={},
      author={Hernandez-Ardieta, J.L. and Santos, D. and Parra, P. and Tapiador, J.E. and Peris-Lopez, P. and Lopez, J. and Fernandez Navarrete, G. },
      pages={},
      }
    • [PDF] G. Suarez-Tangil, J. E. Tapiador, and P. Peris-Lopez, “Stegomalware: playing hide and seek with malicious components in smartphone apps.,” in Inscrypt, 2014.
      [Bibtex]
      @INPROCEEDINGS{c34tangiltp2014,
      year={2014},
      booktitle={INSCRYPT},
      volume={},
      series={},
      doi={},
      title={Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps. },
      url={},
      publisher={},
      keywords={},
      author={Suarez-Tangil, G. and Tapiador, J.E. and Peris-Lopez, P.},
      pages={},
      }
    • [PDF] [DOI] G. Suarez-Tangil, M. Conti, J. E. Tapiador, and P. Peris-Lopez, “Detecting targeted smartphone malware with behavior-triggering stochastic models,” in Computer security – esorics 2014, 2014, pp. 183-201.
      [Bibtex]
      @INPROCEEDINGS{c29sctp2014,
      year={2014},
      booktitle={Computer Security - ESORICS 2014},
      volume={8712},
      series={Lecture Notes in Computer Science},
      doi={10.1007/978-3-319-11203-9_11},
      title={Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models},
      url={http://dx.doi.org/10.1007/978-3-319-11203-9_11},
      publisher={Springer International Publishing},
      keywords={Smartphone security; targeted malware; cloud analysis},
      author={Suarez-Tangil, G. and Conti, M. and Tapiador, J. E. and Peris-Lopez, P.},
      pages={183-201},
      }
    • [PDF] R. M. Seepers, C. Strydis, P. Peris-Lopez, I. Sourdis, and C. I. De Zeeuw, “Peak misdetection in heart-beat-based security: characterization and tolerance,” in International conference of the ieee engineering in medicine and biology society — embc’14, 2014.
      [Bibtex]
      @INPROCEEDINGS{c30sspsz2014,
      year={2014},
      booktitle={International Conference of the IEEE Engineering in Medicine and Biology Society -- EMBC'14},
      volume={},
      series={},
      doi={},
      title={Peak Misdetection in Heart-Beat-Based Security: Characterization and Tolerance},
      url={},
      publisher={},
      keywords={},
      author={Seepers, R. M. and Strydis, C. and Peris-Lopez, P. and Sourdis, I. and De Zeeuw, C. I.},
      pages={},
      }
    • M. Naser, I. Aldmour, P. Peris-Lopez, and R. Budiarto, “Vulnerability analysis of a mutual authentication protocol conforming to epc class-1 generation-2 standard,” in International conference on electrical engineering, computer science and informatics — eecsi’04, 2014.
      [Bibtex]
      @INPROCEEDINGS{c31napb2014,
      year={2014},
      booktitle={International Conference on Electrical Engineering, Computer Science and Informatics -- EECSI'04},
      volume={},
      series={},
      doi={},
      title={Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard},
      url={},
      publisher={},
      keywords={},
      author={Naser, M. and Aldmour, I. and Peris-Lopez, P. and Budiarto, R.},
      pages={},
      }
    • M. Safkhani, N. Bagheri, P. Peris-Lopez, A. Mitrokotsa, and J. C. Hernandez-Castro, “Weaknesses in another Gen2-Based RFID authentication protocol,” in Ieee international conference on rfid-technology and applications — ieee rfid ta 2012, Nice, France, 2012.
      [Bibtex]
      @INPROCEEDINGS{c28snpmh2012,
      author = {Safkhani, Masoumeh and Bagheri, Nasour and Peris-Lopez, Pedro and Mitrokotsa, Aikaterini and Hernandez-Castro, Julio Cesar. },
      title = {Weaknesses in another {Gen2-Based} {RFID} Authentication Protocol},
      booktitle = {IEEE International Conference on RFID-Technology and Applications -- IEEE RFID TA 2012},
      year = {2012},
      editor = {},
      volume = {},
      series = {IEEE Press},
      pages = {},
      address = {Nice, France},
      month = {November},
      organization = {IEEE},
      publisher = {},
      pdf = {},
      slides = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • M. Safkhani, P. Peris-Lopez, C. H. ulio Castro, and N. Bagheri, “Cryptanalysis of cho et al.’s protocol: a hash-based rfid tag mutual authentication protocol,” in International conference on applied and computational mathematics (icacm), 2012.
      [Bibtex]
      @inproceedings{c27sphb2012,
      author = {Masoumeh Safkhani and Pedro Peris-Lopez and ulio C{\'e}sar Hern{\'a}ndez Castro and Nasour Bagheri},
      title = {Cryptanalysis of Cho et al.'s Protocol: A Hash-Based RFID Tag Mutual Authentication Protocol},
      booktitle = {International Conference on Applied and Computational Mathematics (ICACM)},
      year = {2012},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • M. Safkhani, P. Peris-Lopez, N. Bagheri, M. Naderi, and J. C. H. Castro, “On the security of tan et al. serverless rfid authentication and search protocols,” in Rfidsec, 2012.
      [Bibtex]
      @inproceedings{c26spbnh2012,
      author = {Masoumeh Safkhani and Pedro Peris-Lopez and Nasour Bagheri and Majid Naderi and Julio C{\'e}sar Hern{\'a}ndez Castro},
      title = {On the Security of Tan et al. Serverless RFID Authentication and Search Protocols},
      booktitle = {RFIDSec},
      year = {2012},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • [PDF] [DOI] J. C. Hernandez-Castro, P. Peris-Lopez, M. Safkhani, N. Bagheri, and M. Naderi, “Another fallen hash-based rfid authentication protocol,” in Wistp, 2012, pp. 29-37.
      [Bibtex]
      @inproceedings{c25hpsbn2012,
      author = {Julio C. Hernandez-Castro and
      Pedro Peris-Lopez and
      Masoumeh Safkhani and
      Nasour Bagheri and
      Majid Naderi},
      title = {Another Fallen Hash-Based RFID Authentication Protocol},
      booktitle = {WISTP},
      year = {2012},
      volume = {7322},
      series = {LNCS},
      pages = {29-37},
      publisher = {Springer-Verlag},
      doi = {10.1007/978-3-642-30955-7_4},
      crossref = {DBLP:conf/wistp/2012},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. C. H. Castro, P. Peris-Lopez, and J. Aumasson, “On the key schedule strength of present,” in Dpm/setop, 2011, pp. 253-263.
      [Bibtex]
      @inproceedings{c24hpa2011,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Jean-Philippe Aumasson},
      title = {On the Key Schedule Strength of PRESENT},
      booktitle = {DPM/SETOP},
      year = {2011},
      pages = {253-263},
      doi = {10.1007/978-3-642-28879-1_17},
      crossref = {DBLP:conf/esorics/2011-7122},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] J. Aumasson, A. Mitrokotsa, and P. Peris-Lopez, “A note on a privacy-preserving distance-bounding protocol,” in Icics, 2011, pp. 78-92.
      [Bibtex]
      @inproceedings{c23amp2011,
      author = {Jean-Philippe Aumasson and
      Aikaterini Mitrokotsa and
      Pedro Peris-Lopez},
      title = {A Note on a Privacy-Preserving Distance-Bounding Protocol},
      booktitle = {ICICS},
      year = {2011},
      pages = {78-92},
      doi = {10.1007/978-3-642-25243-3_7},
      crossref = {DBLP:conf/icics/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] M. Merhi, J. C. H. Castro, and P. Peris-Lopez, “Studying the pseudo random number generator of a low-cost rfid tag,” in Rfid-ta, 2011, pp. 381-385.
      [Bibtex]
      @inproceedings{c22mhp2011,
      author = {Mohamad Merhi and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez},
      title = {Studying the pseudo random number generator of a low-cost
      RFID tag},
      booktitle = {RFID-TA},
      year = {2011},
      pages = {381-385},
      doi = {10.1109/RFID-TA.2011.6068666},
      crossref = {DBLP:conf/rfidta/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] H. Martin, E. S. Millán, L. Entrena, J. C. H. Castro, and P. Peris-Lopez, “Akari-x: a pseudorandom number generator for secure lightweight systems,” in Iolts, 2011, pp. 228-233.
      [Bibtex]
      @inproceedings{c21hmlhp2011,
      author = {Honorio Martin and
      Enrique San Mill{\'a}n and
      Luis Entrena and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez},
      title = {AKARI-X: A pseudorandom number generator for secure lightweight systems},
      booktitle = {IOLTS},
      year = {2011},
      pages = {228-233},
      doi = {10.1109/IOLTS.2011.5994534},
      crossref = {DBLP:conf/iolts/2011},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, E. San Millán, J. C. A. van der Lubbe, and L. A. Entrena, “Cryptographically secure pseudo-random bit generator for rfid tags,” in International conference for internet technology and secured transactions (icitst), 2010, pp. 1-6.
      [Bibtex]
      @INPROCEEDINGS{c20pmle2010,
      author={Peris-Lopez, P. and San Millán, E. and van der Lubbe, J.C.A. and Entrena, L.A.},
      booktitle={International Conference for Internet Technology and Secured Transactions (ICITST)},
      title={Cryptographically secure pseudo-random bit generator for RFID tags},
      year={2010},
      month={nov.},
      volume={},
      number={},
      pages={1 -6},
      keywords={Clocks;Cryptography;Radiofrequency identification;cryptographic protocols;radiofrequency identification;random number generation;security of data;transponders;Blum-Blum-Shub pseudorandom number generator;RFID protocols;RFID tags;cryptographically secure pseudorandom bit generator;security levels;transponder;BBS;CS-PRNG;RFID;privacy;randomness;},
      doi={},
      note = {(Best paper award)},
      ISSN={},}
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiador, and T. Li, “Quasi-linear cryptanalysis of a secure rfid ultralightweight authentication protocol,” in Inscrypt, 2010, pp. 427-442.
      [Bibtex]
      @inproceedings{c19phptl2010,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiador and
      Tieyan Li},
      title = {Quasi-Linear Cryptanalysis of a Secure RFID Ultralightweight Authentication Protocol},
      booktitle = {Inscrypt},
      year = {2010},
      pages = {427-442},
      doi = {10.1007/978-3-642-21518-6_30},
      crossref = {DBLP:conf/cisc/2010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. H. Castro, R. C. -W. Phan, J. M. Estévez-Tapiado, and T. Li, “Passive cryptanalysis of an ultralightweight authentication protocol of rfidsec’10 asia (poster),” in Rfidsec, 2010.
      [Bibtex]
      @inproceedings{c18phpt2010,
      author = {Pedro Peris-Lopez and Julio C{\'e}sar Hern{\'a}ndez Castro and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiado and Tieyan Li},
      title = {Passive Cryptanalysis of an Ultralightweight Authentication Protocol of RFIDsec'10 Asia (Poster)},
      booktitle = {RFIDSec},
      year = {2010},
      pages = {},
      doi = {},
      crossref = {},
      bibsource = {}
      }
    • [PDF] [DOI] J. C. H. Castro, P. Peris-Lopez, R. C. -W. Phan, and J. M. Estévez-Tapiador, “Cryptanalysis of the david-prasad rfid ultralightweight authentication protocol,” in Rfidsec, 2010, pp. 22-34.
      [Bibtex]
      @inproceedings{c17hppt2010,
      author = {Julio C{\'e}sar Hern{\'a}ndez Castro and
      Pedro Peris-Lopez and
      Raphael C.-W. Phan and
      Juan M. Est{\'e}vez-Tapiador},
      title = {Cryptanalysis of the David-Prasad RFID Ultralightweight Authentication Protocol},
      booktitle = {RFIDSec},
      year = {2010},
      pages = {22-34},
      doi = {10.1007/978-3-642-16822-2_3},
      crossref = {DBLP:conf/rfidsec/2010},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, E. Palomar, and J. C. A. van der Lubbe, “Cryptographic puzzles and distance-bounding protocols: practical tools for rfid security,” in Rfid, 2010 ieee international conference on, 2010, pp. 45-52.
      [Bibtex]
      @INPROCEEDINGS{c16phtpl2010,
      author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Tapiador, J.M.E. and Palomar, E. and van der Lubbe, J.C.A.},
      booktitle={RFID, 2010 IEEE International Conference on},
      title={Cryptographic puzzles and distance-bounding protocols: Practical tools for RFID security},
      year={2010},
      month={april},
      volume={},
      number={},
      pages={45 -52},
      keywords={Clothing;Computer science;Cryptographic protocols;Cryptography;Databases;Manufacturing;Privacy;Protection;Radiofrequency identification;Security;cryptographic protocols;data privacy;radiofrequency identification;telecommunication security;RFID;WSBC;cryptographic puzzles;distance bounding protocols;privacy protection;systems security;weakly secret bit commitment;RFID security;WSBC;cryptographic puzzles;distance-bounding protocols;privacy;traceability;},
      doi={10.1109/RFID.2010.5467258},
      ISSN={},}
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and J. C. A. van der Lubbe, “Security Flaws in a Recent Ultralightweight RFID Protocol,” in Workshop on rfid security — rfidsec asia’10, Singapore, Republic of Singapore, 2010, pp. 83-93.
      [Bibtex]
      @INPROCEEDINGS{ch15phtl2010,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and van der Lubbe, Jan C. A.},
      title = {{Security Flaws in a Recent Ultralightweight RFID Protocol}},
      booktitle = {Workshop on RFID Security -- RFIDSec Asia'10},
      year = {2010},
      editor = {},
      volume = {4},
      series = {Cryptology and Information Security},
      pages = {83--93},
      address = {Singapore, Republic of Singapore},
      month = {February},
      organization = {},
      publisher = {IOS Press},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. Hernandez-Castro, J. Tapiador, T. Li, and J. Lubbe, “Weaknesses in two recent lightweight rfid authentication protocols,” in Information security and cryptology, 2011, pp. 383-392.
      [Bibtex]
      @inproceedings{c14phttl2011,
      year={2011},
      isbn={978-3-642-16341-8},
      booktitle={Information Security and Cryptology},
      volume={6151},
      series={Lecture Notes in Computer Science},
      doi={10.1007/978-3-642-16342-5_28},
      title={Weaknesses in Two Recent Lightweight RFID Authentication Protocols},
      url={http://dx.doi.org/10.1007/978-3-642-16342-5_28},
      publisher={Springer Berlin Heidelberg},
      keywords={RFID; EPC; Cloning; Traceability; Impersonation; Cryptanalysis; BAN; Proof},
      author={Peris-Lopez, Pedro and Hernandez-Castro, JulioC. and Tapiador, JuanM.E. and Li, Tieyan and Lubbe, JanC.A.},
      pages={383-392}
      }
    • [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estévez-Tapiador, E. S. Millán, and J. C. A. van der Lubbe, “Security flaws in an efficient pseudo-random number generator for low-power environments,” in Sewcn, 2009, pp. 25-35.
      [Bibtex]
      @inproceedings{c13phtsl2009,
      author = {Pedro Peris-Lopez and
      Julio C. Hernandez-Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Enrique San Mill{\'a}n and
      Jan C. A. van der Lubbe},
      title = {Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power Environments},
      booktitle = {SEWCN},
      year = {2009},
      pages = {25-35},
      doi = {10.1007/978-3-642-11526-4_3},
      crossref = {DBLP:conf/sewcn/2009},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] J. C. Hernandez-Castro, J. M. Estevez-Tapiador, P. Peris-Lopez, and J. Quisquater, “Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations,” in International workshop on coding and cryptography — wcc’09, Ullensvang, Norway, 2009.
      [Bibtex]
      @INPROCEEDINGS{c12htpq2009,
      author = {Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Peris-Lopez, Pedro and Quisquater, Jean-Jacques},
      title = {{Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations}},
      booktitle = {International Workshop on Coding and Cryptography -- WCC'09},
      year = {2009},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Ullensvang, Norway},
      month = {May},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] J. C. Hernandez-Castro, J. E. Tapiador, P. Peris-Lopez, J. A. Clark, and E. -G. Talbi, “Metaheuristic traceability attack against slmap, an rfid lightweight authentication protocol,” in Parallel distributed processing, 2009. ipdps 2009. ieee international symposium on, 2009, pp. 1-5.
      [Bibtex]
      @INPROCEEDINGS{c11htpct2009,
      author={Hernandez-Castro, J.C. and Tapiador, J.E. and Peris-Lopez, P. and Clark, J.A. and Talbi, E.-G.},
      booktitle={Parallel Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on}, title={Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol},
      year={2009},
      month={may},
      volume={},
      number={},
      pages={1 -5},
      keywords={Authentication;Computer science;Cost function;Cryptographic protocols;Cryptography;NP-hard problem;Proposals;Radiofrequency identification;Robustness;Security;cryptographic protocols;message authentication;radiofrequency identification;RFID ultra-lightweight authentication protocol;SLMAP algorithm;black-box technique;metaheuristic traceability attack;},
      doi={10.1109/IPDPS.2009.5161121},
      ISSN={1530-2075},}
    • [PDF] [DOI] P. Peris-Lopez, T. Lim, and T. Li, “Providing stronger authentication at a low cost to rfid tags operating under the epcglobal framework,” in Euc (2), 2008, pp. 159-166.
      [Bibtex]
      @inproceedings{c10pll2008,
      author = {Pedro Peris-Lopez and
      Tong-Lee Lim and
      Tieyan Li},
      title = {Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal Framework},
      booktitle = {EUC (2)},
      year = {2008},
      pages = {159-166},
      doi = {10.1109/EUC.2008.82},
      crossref = {DBLP:conf/euc/2008-2},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Advances in ultralightweight cryptography for low-cost rfid tags: gossamer protocol,” in Wisa, 2008, pp. 56-68.
      [Bibtex]
      @inproceedings{c9phtr2008,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol},
      booktitle = {WISA},
      year = {2008},
      pages = {56-68},
      doi = {10.1007/978-3-642-00306-6_5},
      crossref = {DBLP:conf/wisa/2008},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, T. Li, L. Tong Lee, J. C. Hernandez-Castro, and J. M. Estevez-Tapiador, “Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard,” in Workshop on rfid security — rfidsec’08, Budapest, Hungary, 2008.
      [Bibtex]
      @INPROCEEDINGS{c8ptlht2008,
      author = {Peris-Lopez, Pedro and Li, Tieyan and Tong Lee, Lim and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M.},
      title = {{Vulnerability Analysis of a Mutual Authentication Scheme under the EPC Class-1 Generation-2 Standard}},
      booktitle = {Workshop on RFID Security -- RFIDSec'08},
      year = {2008},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Budapest, Hungary},
      month = {July},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “An efficient authentication protocol for rfid systems resistant to active attacks,” in Euc workshops, 2007, pp. 781-794.
      [Bibtex]
      @inproceedings{c7phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks},
      booktitle = {EUC Workshops},
      year = {2007},
      pages = {781-794},
      doi = {10.1007/978-3-540-77090-9_71},
      crossref = {DBLP:conf/euc/2007w},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Solving the simultaneous scanning problem anonymously: clumping proofs for rfid tags,” in Security, privacy and trust in pervasive and ubiquitous computing, 2007. secperu 2007. third international workshop on, 2007, pp. 55-60.
      [Bibtex]
      @INPROCEEDINGS{c6phtr2006,
      author={Peris-Lopez, P. and Hernandez-Castro, J.C. and Estevez-Tapiador, J.M. and Ribagorda, A.},
      booktitle={Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2007. SECPerU 2007. Third International Workshop on}, title={Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags},
      year={2007},
      month={july},
      volume={},
      number={},
      pages={55 -60},
      keywords={Frequency;History;Privacy;Proposals;Protection;Protocols;RFID tags;Radiofrequency identification;Security;Ubiquitous computing;data privacy;radiofrequency identification;RFID security;RFID tag;clumping proofs;location privacy violation;multi-proofs session attack;privacy;replay attacks;simultaneous scanning problem anonymously;},
      doi={10.1109/SECPERU.2007.12},
      ISSN={},}
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard,” in Workshop on rfid security — rfidsec’07, Malaga, Spain, 2007.
      [Bibtex]
      @INPROCEEDINGS{c5phtr2006,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      title = {{Cryptanalysis of a Novel Authentication Protocol Conforming to EPC-C1G2 Standard}},
      booktitle = {Workshop on RFID Security -- RFIDSec'07},
      year = {2007},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      address = {Malaga, Spain},
      month = {July},
      organization = {},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Rfid systems: a survey on security threats and proposed solutions,” in Pwc, 2006, pp. 159-170.
      [Bibtex]
      @inproceedings{c4phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {RFID Systems: A Survey on Security Threats and Proposed Solutions},
      booktitle = {PWC},
      year = {2006},
      pages = {159-170},
      doi = {10.1007/11872153_14},
      crossref = {DBLP:conf/ifip6-8/2006},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “Emap: an efficient mutual-authentication protocol for low-cost rfid tags,” in Otm workshops (1), 2006, pp. 352-361.
      [Bibtex]
      @inproceedings{c3phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags},
      booktitle = {OTM Workshops (1)},
      year = {2006},
      pages = {352-361},
      doi = {10.1007/11915034_59},
      crossref = {DBLP:conf/otm/2006-w1},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] [DOI] P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda, “M2ap: a minimalist mutual-authentication protocol for low-cost rfid tags,” in Uic, 2006, pp. 912-923.
      [Bibtex]
      @inproceedings{c2phtr2006,
      author = {Pedro Peris-Lopez and
      Julio C{\'e}sar Hern{\'a}ndez Castro and
      Juan M. Est{\'e}vez-Tapiador and
      Arturo Ribagorda},
      title = {M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags},
      booktitle = {UIC},
      year = {2006},
      pages = {912-923},
      doi = {10.1007/11833529_93},
      crossref = {DBLP:conf/uic/2006},
      bibsource = {DBLP, http://dblp.uni-trier.de}
      }
    • [PDF] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. Estevez-Tapiador, and A. Ribagorda, “LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags,” in Workshop on rfid security — rfidsec’06, Graz, Austria, 2006.
      [Bibtex]
      @INPROCEEDINGS{c1phtr2006,
      author = {Peris-Lopez, Pedro and Hernandez-Castro, Julio C. and Estevez-Tapiador, Juan M. and Ribagorda, Arturo},
      title = {{LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID tags}},
      booktitle = {Workshop on RFID Security -- RFIDSec'06},
      year = {2006},
      editor = {},
      volume = {},
      series = {},
      pages = {},
      month = {July},
      address = {Graz, Austria},
      organization = {Ecrypt},
      publisher = {},
      bibsource = {Information Security Group (GSI), UCL, Louvain-la-Neuve, Belgium},
      }

© Copyright Pedro Peris-Lopez – LW Cryptography 2017. All Rights Reserved