. Dictionary, com's 21st Century Lexicon, p.178, 2012.

G. Ateniese, J. Camenisch, and B. De-medeiros, Untraceable RFID tags via insubvertible encryption, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.92-101, 2005.
DOI : 10.1145/1102120.1102134

G. Ateniese, J. Kirsch, and M. Blanton, Secret Handshakes with Dynamic and Fuzzy Matching, Proceedings of the Network and Distributed System Security Symposium , NDSS. The Internet Society, p.186, 2007.

G. Avoine, Adversarial Model for Radio Frequency Identification, Cryptology ePrint Archive Report, vol.37, issue.170, pp.38-63, 2005.

G. Avoine and P. Oechslin, A Scalable and Provably Secure Hash-Based RFID Protocol, Third IEEE International Conference on Pervasive Computing and Communications Workshops, pp.110-114, 2005.
DOI : 10.1109/PERCOMW.2005.12

G. Avoine and P. Oechslin, RFID Traceability: A Multilayer Problem, Financial Cryptography and Data Security, pp.577-577, 2005.
DOI : 10.1007/11507840_14

G. Avoine and A. Tchamkerten, An Efficient Distance Bounding RFID??Authentication??Protocol: Balancing False-Acceptance Rate and Memory Requirement, Information Security, pp.250-261, 2009.
DOI : 10.1007/978-3-540-28632-5_26

. Wong, Secret Handshakes from Pairing- Based Key Agreements, Proceedings of the 2003 IEEE Symposium on Security and Privacy, SP '03, p.187, 2003.

M. Bellare and P. Rogaway, Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993.
DOI : 10.1145/168588.168596

M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, Relations among notions of security for public-key encryption schemes, Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology, pp.26-45, 1998.
DOI : 10.1007/BFb0055718

C. Berbain, O. Billet, J. Etrog, and H. Gilbert, An efficient forward private RFID protocol, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.43-53, 2009.
DOI : 10.1145/1653662.1653669

E. Berlekamp, R. Mceliece, and H. Van-tilborg, On the inherent intractability of certain coding problems. Information Theory, IEEE Transactions on, vol.24, issue.3, pp.384-386, 1944.

O. Billet and K. Elkhiyaoui, Two Attacks against the F f RFID Protocol, Progress in Cryptology -INDOCRYPT 2009, pp.308-320, 2009.
DOI : 10.1007/978-3-642-10628-6_21

I. F. Blake, G. Seroussi, and N. P. Smart, Elliptic curves in cryptography, 1999.
DOI : 10.1017/CBO9781107360211

I. F. Blake, G. Seroussi, N. Smart, and J. W. Cassels, Advances in Elliptic Curve Cryptography, Lecture Note Series), Chapter IX, pp.183-213, 2005.
DOI : 10.1017/CBO9780511546570

E. O. Blass and M. Zitterbart, Towards Acceptable Public-Key Encryption in Sensor Networks, Proceedings of ACM 2nd International Workshop on Ubiquitous Computing, pp.88-93, 2005.

E. O. Blass, A. Kurmus, R. Molva, G. Noubir, and A. Shikfa, The F_f-Family of Protocols for RFID-Privacy and Authentication, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.3, pp.43-45, 2010.
DOI : 10.1109/TDSC.2010.37

E. O. Blass, K. Elkhiyaoui, and R. Molva, Tracker: security and privacy for RFIDbased supply chains, NDSS'11, 18th Annual Network and Distributed System Security Symposium, pp.6-9, 2011.

A. Blum, A. Kalai, and H. Wasserman, Noise-tolerant learning, the parity problem, and the statistical query model, Journal of the ACM, vol.50, issue.4, pp.506-519, 2003.
DOI : 10.1145/792538.792543

L. Bolotnyy and G. Robins, Physically Unclonable Function-Based Security and Privacy in RFID Systems, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07), pp.211-220, 2007.
DOI : 10.1109/PERCOM.2007.26

D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, SIAM Journal on Computing, vol.32, issue.3, pp.586-615, 2003.
DOI : 10.1137/S0097539701398521

D. Boneh, B. Lynn, and H. Shacham, Short Signatures from the Weil Pairing, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASI- ACRYPT '01, pp.514-532, 2001.

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, EUROCRYPT'03, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

D. Boneh, B. Lynn, and H. Shacham, Short Signatures from the Weil Pairing, Journal of Cryptology, vol.17, pp.297-319, 2004.

D. Boneh, E. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts, TCC, pp.325-341, 2005.
DOI : 10.1007/978-3-540-30576-7_18

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Brier, J. S. Coron, T. Icart, D. Madore, H. Randriam et al., Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, Advances in Cryptology ? CRYPTO 2010, pp.237-254, 2010.
DOI : 10.1007/978-3-642-14623-7_13

J. Bringer, H. Chabanne, and E. Dottax, HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06), p.29, 2006.
DOI : 10.1109/SECPERU.2006.10

J. Bringer, H. Chabanne, T. Icart, T. Burbridge, and A. Soppera, Cryptanalysis of EC-RAC, a RFID Identification Protocol, Cryptology and Network Security RFID, 2010 IEEE International Conference on, pp.149-161, 2008.
DOI : 10.1007/978-3-540-76900-2_5

M. Burmester, B. Medeiros, and R. Motta, Provably Secure Grouping-Proofs for RFID Tags, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, CARDIS '08, pp.176-190, 2008.
DOI : 10.1109/PERCOM.2007.30

S. Canard and I. Coisel, Data Synchronization in Privacy-Preserving RFID Authentication Schemes, Workshop on RFID Security ? RFIDSec'08, p.50, 2008.

R. Canetti, O. Goldreich, and S. Halevi, The random oracle methodology

J. , L. Carter, and M. N. Wegman, Universal classes of hash functions, Journal of Computer and System Sciences, vol.18, issue.2, pp.143-154, 1979.

C. Castelluccia and G. Avoine, Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags, Lecture Notes in Computer Science, vol.3928, pp.289-299, 2006.
DOI : 10.1007/11733447_21

H. Chabanne and G. Fumaroli, Noisy Cryptographic Protocols for Low-Cost RFID Tags. Information Theory, IEEE Transactions on, vol.52, issue.8, pp.3562-3566, 2006.

S. Chatterjee and A. Menezes, On Cryptographic Protocols Employing BIBLIOGRAPHY Asymmetric Pairings ? The Role of ? Revisited, Cryptology ePrint Archive Report, vol.480, p.23, 2009.

K. Chawla, G. Robins, and W. Weimer, On Mitigating Covert Channels in RFID- Enabled Supply Chains Cobis Consortium. Collaborative Business Items: Chemical drums use-case, RFIDSec Asia, p.186, 2007.

R. Cramer and V. Shoup, A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack, CRYPTO '98, pp.13-25, 1998.
DOI : 10.1007/BFb0055717

I. Damgård and M. Pedersen, RFID Security: Tradeoffs between Security and Efficiency, Topics in Cryptology ? CT-RSA 2008, p.318
DOI : 10.1007/978-3-540-79263-5_20

B. Danev, T. S. Heydt-benjamin, and S. Capkun, Physical-layer identification of RFID devices, Proceedings of the 18th conference on USENIX security symposium , SSYM'09, pp.199-214, 2009.

E. , D. Cristofaro, G. Tsudik, E. De-cristofaro, J. Kim et al., Practical Private Set Intersection Protocols with Linear Complexity, Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. In Advances in Cryptology -ASIACRYPT 2010, pp.143-159, 2010.

R. H. Deng, Y. Li, M. Yung, and Y. Zhao, A New Framework for RFID Privacy, Proceedings of the 15th European conference on Research in computer security, ES- ORICS'10, pp.1-18, 2010.
DOI : 10.1007/978-3-642-15497-3_1

S. Devadas, E. Suh, S. Paral, R. Sowell, T. Ziola et al., Design and Implementation of PUF-Based "Unclonable" RFID ICs for Anti-Counterfeiting and Security Applications, 2008 IEEE International Conference on RFID, pp.58-64, 2008.
DOI : 10.1109/RFID.2008.4519377

R. , D. Pietro, and R. Molva, Information confinement, privacy, and security in RFID systems, ESORICS 2007, 12th European Symposium On Research In Computer Security, pp.33-45, 2007.

W. Diffie and M. Hellman, New directions in cryptography Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976.

T. Dimitriou, A Lightweight RFID Protocol to protect against Traceability and Cloning attacks, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp.59-66, 2005.
DOI : 10.1109/SECURECOMM.2005.4

T. Dimitriou, rfidDOT, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.70-71, 2008.
DOI : 10.1145/1460877.1460921

K. Elkhiyaoui, E. O. Blass, and R. Molva, ROTIV: RFID Ownership Transfer with Issuer Verification, Proceedings of the 7th international conference on RFID Security and Privacy, pp.163-182, 2012.
DOI : 10.1007/978-3-642-25286-0_11

K. Elkhiyaoui, E. O. Blass, and R. Molva, CHECKER, Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks, WISEC '12, pp.173-184
DOI : 10.1145/2185448.2185471

K. Elkhiyaoui, E. O. Blass, and R. Molva, T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags, Workshop on RFID Security
DOI : 10.1007/978-3-642-36140-1_6

J. Fan, J. Hermans, and F. Vercauteren, On the Claimed Privacy of EC-RAC III, Proceedings of the 6th international conference on Radio frequency identification: security and privacy issues
DOI : 10.1007/978-3-642-16822-2_7

M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, Strong Authentication for RFID Systems Using the AES Algorithm, Cryptographic Hardware and Embedded Systems -CHES 2004, pp.85-140, 2004.
DOI : 10.1007/978-3-540-28632-5_26

K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, p.173, 2003.
DOI : 10.1002/9780470665121

S. Fouladgar and H. Afifi, An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags, First International EURASIP Workshop on RFID Technology, p.182, 2007.

D. Freeman, M. Scott, and E. Teske, A Taxonomy of Pairing-Friendly Elliptic Curves, Journal of Cryptology, vol.2, issue.5
DOI : 10.1007/s00145-009-9048-z

E. Fujisaki and T. Okamoto, How to Enhance the Security of Public-Key Encryption at Minimum Cost, Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography , PKC '99, pp.53-68, 1999.
DOI : 10.1007/3-540-49162-7_5

S. D. Galbraith, K. G. Paterson, and N. P. Smart, Pairings for cryptographers, Discrete Applied Mathematics, vol.156, issue.16, pp.3113-3121, 2008.
DOI : 10.1016/j.dam.2007.12.010

H. Gilbert, M. Robshaw, and H. Sibert, Active attack against HB+: a provably secure lightweight authentication protocol, Electronics Letters, vol.41, issue.21, pp.411169-1170, 2005.
DOI : 10.1049/el:20052622

H. Gilbert, M. Robshaw, and Y. Seurin, Good Variants of HB???+??? Are Hard to Find, In Financial Cryptography and Data Security Lecture Notes in Computer Science, vol.5143, pp.156-170, 2008.
DOI : 10.1007/978-3-540-85230-8_12

H. Gilbert, M. J. Robshaw, and Y. Seurin, HB#: increasing the security and efficiency of HB+, Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology , EUROCRYPT'08, pp.361-378, 2008.

M. Girault, Self-certified public keys
DOI : 10.1007/3-540-46416-6_42

M. Girault, G. Poupard, and J. Stern, On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order, Journal of Cryptology, vol.19, issue.4, pp.463-487, 2006.
DOI : 10.1007/s00145-006-0224-0

O. Goldreich, Modern cryptography, probabilistic proofs and pseudorandomness, Algorithmics and Combinatorics, vol.17, issue.8, p.9, 1999.
DOI : 10.1007/978-3-662-12521-2

O. Goldreich, Foundations of Cryptography Basic Applications, Goldreich, S. Goldwasser, and S. Micali . How to construct random functions, p.138, 2004.

S. Goldwasser, S. Micali, and R. L. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, pp.281-308, 1988.
DOI : 10.1137/0217017

P. Golle, M. Jakobsson, A. Juels, and P. Syverson, Universal Re-encryption for Mixnets, Proceedings of the 2004 RSA Conference, Cryptographer's track, pp.163-178, 2002.
DOI : 10.1007/978-3-540-24660-2_14

V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for finegrained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006.

J. Ha, S. Moon, J. Zhou, and J. Ha, A New Formal Proof Model for RFID Location Privacy, Computer Security - ESORICS 2008, pp.267-281, 2008.
DOI : 10.1007/978-3-540-39881-3_18

G. Hammouri and B. Sunar, PUF-HB: A Tamper-Resilient HB Based Authentication Protocol, Proceedings of the 6th international conference on Applied cryptography and network security, ACNS'08, pp.346-365, 2008.
DOI : 10.1007/978-3-540-68914-0_21

G. P. Hancke and M. G. Kuhn, An RFID Distance Bounding Protocol, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp.5-9, 2005.
DOI : 10.1109/SECURECOMM.2005.56

D. Hankerson, A. J. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography, 2003.

D. E. Holcomb, W. P. Burleson, and K. Fu, Power-Up SRAM State as an Identifying Fingerprint and Source of True Random Numbers, IEEE Transactions on Computers, vol.58, issue.9, pp.1198-1210, 2009.
DOI : 10.1109/TC.2008.212

N. J. Hopper and M. Blum, Secure Human Identification Protocols, Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '01, pp.52-66, 2001.
DOI : 10.1007/3-540-45682-1_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

T. Icart, How to Hash into Elliptic Curves, Advances in Cryptology - CRYPTO 2009, p.303
DOI : 10.1007/978-3-642-03356-8_18

S. Inoue and H. Yasuura, RFID Privacy Using User-controllable Uniqueness, RFID Privacy Workshop, p.176, 2003.

M. Jakobsson and A. Juels, Mix and Match: Secure Function Evaluation via Ciphertexts, Advances in Cryptology at ASIACRYPT, pp.162-177, 1976.
DOI : 10.1007/3-540-44448-3_13

A. Joux, A One Round Protocol for Tripartite Diffie-Hellman, Proceedings of the 4th International Symposium on Algorithmic Number Theory, ANTS-IV, pp.385-394, 2000.

A. Joux and K. Nguyen, Separating Decision Diffie?Hellman from Computational Diffie?Hellman in Cryptographic Groups, Journal of Cryptology, vol.16, issue.4, pp.239-247, 2003.
DOI : 10.1007/s00145-003-0052-4

A. Juels, "Yoking-proofs" for RFID tags, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second, p.138, 2004.
DOI : 10.1109/PERCOMW.2004.1276920

A. Juels, RFID security and privacy: a research survey, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.381-394, 2006.
DOI : 10.1109/JSAC.2005.861395

A. Juels and R. Pappu, Squealing Euros: Privacy Protection in RFID-Enabled Banknotes, In Financial Cryptography Lecture Notes in Computer Science, vol.2742, pp.103-121, 2003.
DOI : 10.1007/978-3-540-45126-6_8

A. Juels and S. Weis, Authenticating Pervasive Devices with Human Protocols, BIBLIOGRAPHY Advances in Cryptology ? CRYPTO 2005, pp.293-308, 2005.
DOI : 10.1007/11535218_18

A. Juels and S. A. Weis, Defining Strong Privacy for RFID, PerCom Workshops, pp.342-347, 2007.

A. Juels, R. L. Rivest, and M. Szydlo, The blocker tag, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, pp.103-111, 2003.
DOI : 10.1145/948109.948126

A. Juels, P. F. Syverson, and D. V. Bailey, High-Power Proxies for Enhancing RFID Privacy and Utility, Privacy Enhancing Technologies, pp.210-226, 2005.
DOI : 10.1007/978-3-540-39881-3_18

T. Karygiannis, B. Eydt, G. Barber, L. Bunn, and T. Phillips, Guidelines for Securing Radio Frequency Identification (RFID) Systems. NIST Special Publication 800?98, pp.154-185, 2007.

J. Katz and A. Y. Lindell, Aggregate Message Authentication Codes, Topics in Cryptology ? CT-RSA 2008, pp.155-169, 2008.
DOI : 10.1007/978-3-540-79263-5_10

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Katz, A. Sahai, and B. Waters, Predicate encryption supporting disjunctions, polynomial equations, and inner products
DOI : 10.1007/978-3-540-78967-3_9

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Katz, J. Shin, and A. Smith, Parallel and Concurrent Security of the HB and HB+ Protocols, Journal of Cryptology, vol.27, issue.3, pp.402-421, 2010.
DOI : 10.1007/s00145-010-9061-2

C. Kim, G. Avoine, F. Koeune, F. X. Standaert, and O. Pereira, The Swiss-Knife RFID Distance Bounding Protocol, Lecture Notes in Computer Science, vol.43, issue.6, pp.98-115, 2008.
DOI : 10.1007/978-3-540-73275-4_8

H. Krawczyk, LFSR-based Hashing and Authentication, Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '94, pp.129-139, 1994.
DOI : 10.1007/3-540-48658-5_15

L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, Lightweight Mutual Authentication and Ownership Transfer for RFID Systems, 2010 Proceedings IEEE INFOCOM, pp.251-255, 2010.
DOI : 10.1109/INFCOM.2010.5462233

S. S. Kumar and C. Paar, Are Standards Compliant Elliptic Curve Cryptosystems feasible on RFID, Proceedings of Workshop on RFID Security, p.52, 2006.

Y. K. Lee, L. Batina, and I. Verbauwhede, EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol, 2008 IEEE International Conference on RFID, pp.97-104, 2008.
DOI : 10.1109/RFID.2008.4519370

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, Elliptic-Curve-Based Security Processor for RFID. Computers, IEEE Transactions on, vol.57, issue.52, pp.1514-1527, 2008.
DOI : 10.1109/tc.2008.148

Y. K. Lee, L. Batina, and I. Verbauwhede, Untraceable RFID authentication protocols: Revision of EC-RAC, RFID, 2009 IEEE International Conference on, pp.178-185, 2009.

Y. K. Lee, L. Batina, D. Singelée, and I. Verbauwhede, Low-cost untraceable authentication protocols for RFID, Proceedings of the third ACM conference on Wireless network security, WiSec '10, pp.55-64, 2010.
DOI : 10.1145/1741866.1741877

E. Levieil and P. Fouque, An Improved LPN Algorithm, Security and Cryptography for Networks, pp.348-359, 2006.
DOI : 10.1007/11832072_24

URL : https://hal.archives-ouvertes.fr/inria-00563959

T. Li and R. Deng, Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.238-245, 2007.
DOI : 10.1109/ARES.2007.159

T. Li and G. Wang, Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols Privacy and Trust in Complex Environments , volume 232 of IFIP International Federation for Information Processing, New Approaches for Security Li and X. Ding. Protecting RFID communications in supply chains Proceedings of ACM Symposium on Information, Computer and Communications Security, pp.109-120, 2007.

C. H. Lim and T. Kwon, Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer, International Conference on Information and Communications Security ? ICICS'06, pp.1-20, 2006.
DOI : 10.1007/11935308_1

C. Ma, Y. Li, R. H. Deng, and T. Li, RFID privacy, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.54-65, 2009.
DOI : 10.1145/1653662.1653670

M. Mcloone and M. Robshaw, Public Key Cryptography and RFID Tags, Topics in Cryptology ? CT-RSA 2007, pp.372-384, 2006.
DOI : 10.1007/11967668_24

A. Menezes, S. Vanstone, and T. Okamoto, Reducing elliptic curve logarithms to logarithms in a finite field, Proceedings of the twenty-third annual ACM symposium on Theory of computing, STOC '91, pp.80-89, 1991.

K. Michael and L. Mccathie, The Pros and Cons of RFID in Supply Chain Management, International Conference on Mobile Business (ICMB'05), pp.623-629, 2005.
DOI : 10.1109/ICMB.2005.103

A. Miyaji, M. Nakabayashi, and S. Takano, New Explicit Conditions of Elliptic Curve Traces for FR-Reduction, TIEICE: IEICE Transactions on Communi- cations/Electronics/Information and Systems, p.23, 2001.

D. Molnar, A. Soppera, D. Wagner, and . Scalable, A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags, In Selected Areas in Cryptography Lecture Notes in Computer Science, vol.3897, issue.93, pp.276-290, 2006.
DOI : 10.1007/11693383_19

. Motorola, Saudi Arabia's luxury retailer Jade Jewellery implements Motorola's RFID technology to improve inventory management and security, p.182, 2010.

J. Munilla and A. Peinado, HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Networks, vol.51, issue.9, pp.2262-2267, 2007.
DOI : 10.1016/j.comnet.2007.01.011

C. Ng, W. Susilo, Y. Mu, and R. Safavi-naini, RFID Privacy Models Revisited, Computer Security -ESORICS 2008, pp.251-266, 2008.
DOI : 10.1145/1368310.1368351

URL : https://works.bepress.com/wsusilo/93/download/

G. Noubir, K. Vijayan, H. J. Nussbaumer, K. Suzuki, and S. Ki-noshita, Signature-based method for run-time fault detection in communication protocols1, RFID Privacy, pp.405-421, 1998.
DOI : 10.1016/S0140-3664(98)00121-2

T. Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes, Advances in Cryptology at CRYPTO' 92, pp.31-53, 1993.
DOI : 10.1007/3-540-48071-4_3

T. Okamoto, Cryptography Based on Bilinear Maps, Applied Algebra, pp.35-50, 2006.
DOI : 10.1007/11617983_3

T. Okamoto and S. Uchiyama, A new public-key cryptosystem as secure as factoring, Eurocrypt '98, LNCS 1403, pp.308-318, 1998.
DOI : 10.1007/BFb0054135

Y. Oren and M. Feldhofer, A low-resource public-key identification scheme for RFID tags and sensor nodes, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.59-68, 2009.
DOI : 10.1145/1514274.1514283

K. Ouafi and S. Vaudenay, Pathchecker: an RFID Application for Tracing Products in Suply-Chains, Workshop on RFID Security ? RFIDSec'09, pp.1-14, 2009.

K. Ouafi, R. Overbeck, and S. Vaudenay, On the Security of HB# against a Man-in-the-Middle Attack, Advances in Cryptology -ASIACRYPT 2008, pp.108-124, 2008.
DOI : 10.1016/j.comnet.2007.01.011

R. Paise and S. Vaudenay, Mutual authentication in RFID, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.292-299, 2008.
DOI : 10.1145/1368310.1368352

P. Peris-lopez, J. C. Hern, J. M. Estevez-tapiador, and A. Ribagorda, LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, In: Proc. of 2nd Workshop on RFID Security, pp.6-43, 2006.

P. Peris-lopez, J. Hernandez-castro, J. Estevez-tapiador, and A. Ribagorda, EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags, On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, pp.352-361
DOI : 10.1007/11915034_59

M. Pirretti, P. Traynor, P. Mcdaniel, and B. Waters, Secure attribute-based systems, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.99-112, 2006.
DOI : 10.3233/jcs-2009-0383

URL : http://doi.org/10.3233/jcs-2009-0383

M. O. Rabin, Digitalized Signatures and Public-key Functions as Intractable as Factorization, p.53, 1979.

M. O. Rabin, Fingerprinting by random polynomials, p.129, 1981.

C. Damith, D. W. Ranasinghe, P. H. Engels, and . Cole, Low-Cost RFID Systems: Confronting Security and Privacy, In: Auto-ID Labs Research Workshop. Portal, p.173, 2005.

M. Rieback, B. Crispo, and A. Tanen-baum, RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management, Information Security and Privacy, p.259
DOI : 10.1007/11506157_16

P. Rogaway and T. Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, FSE, 2004.
DOI : 10.1007/978-3-540-25937-4_24

U. Rührmair, F. Sehnke, J. Sölter, G. Dror, S. Devadas et al., Modeling attacks on physical unclonable functions, Proceedings of the 17th ACM conference on Computer and communications security , CCS '10, pp.237-249, 2010.

A. R. Sadeghi, I. Visconti, and C. Wachsmann, Anonymizer-Enabled Security and Privacy for RFID, 8th International Conference on Cryptology And Network Security ? CANS'09, p.178, 2009.
DOI : 10.1007/978-3-642-10433-6_10

A. Sahai and B. Waters, Fuzzy Identity-Based Encryption, Advances in Cryp- 201 BIBLIOGRAPHY tology ? EUROCRYPT 2005, pp.557-557, 2005.
DOI : 10.1007/11426639_27

J. Saito and K. Sakurai, Grouping Proof for RFID Tags, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers), pp.621-624, 2005.
DOI : 10.1109/AINA.2005.197

J. Saito, K. Imamoto, and K. Sakurai, Reassignment Scheme of an RFID Tag???s Key for Owner Transfer, Embedded and Ubiquitous Computing, pp.1303-1312, 2005.
DOI : 10.1007/11596042_132

C. Schnorr, A. Eurocryptâeurocrypt?eurocryptâ, and ?. , Efficient Identification and Signatures for Smart Cards, Advances in CryptologyâCryptology?Cryptologyâ ?, pp.688-689, 1990.
DOI : 10.1007/3-540-46885-4_68

M. Scott, Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number, Cryptology ePrint Archive Report, vol.164, p.24, 2002.

A. Shamir, How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979.
DOI : 10.1145/359168.359176

A. Shamir, Memory efficient variants of public-key schemes for smart card applications, Advances in Cryptology at EUROCRYPT'94, pp.445-449, 1995.
DOI : 10.1007/BFb0053461

A. Shamir, SQUASH ??? A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags, Fast Software Encryption, pp.144-157, 2008.
DOI : 10.1007/978-3-540-71039-4_9

H. Shuihua and C. Chu, Tamper Detection in RFID-Enabled Supply Chains Using Fragile Watermarking, Proceedings of IEEE RFID, pp.111-117, 2008.

B. Song, RFID Tag Ownership Transfer

M. Soos, Analysing the Molva and Di Pietro Private RFID Authentication Scheme, Workshop on RFID Security ? RFIDSec'08, 1951.

T. Rfid, RFID Luxury Goods Solutions, p.182, 2010.

M. Tajima, Strategic value of RFID in supply chain management, Journal of Purchasing and Supply Management, vol.13, issue.4, pp.261-273, 2007.
DOI : 10.1016/j.pursup.2007.11.001

G. Tsudik, YA-TRAP: Yet Another Trivial RFID Authentication Protocol, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06), pp.32-33, 2006.
DOI : 10.1109/PERCOMW.2006.152

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Tuyls and L. Batina, RFID-Tags for Anti-counterfeiting, Topics in Cryptology ? CT-RSA 2006, pp.115-131
DOI : 10.1007/11605805_8

I. Vajda and L. Buttyán, Lightweight Authentication Protocols for Low-Cost RFID Tags, Second Workshop on Security in Ubiquitous Computing ? Ubicomp, p.43, 2003.

T. Van-deursen and S. Radomirovic, Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RACs. Cryptology ePrint Archive, Report, vol.332, p.53, 2009.

S. Vaudenay, On Privacy Models for RFID, Proceedings of ASIACRYPT, pp.68-87, 2007.
DOI : 10.1007/978-3-540-76900-2_5

. Verayo, Verayo Anti-Counterfeiting Solution, p.182, 2010.

E. Verheul and A. Eurocrypt, Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems, Advances in Cryptologyâtology?tologyâ ?, pp.195-210, 2001.
DOI : 10.1007/3-540-44987-6_13

L. C. Washington, Elliptic Curves: Number Theory and Cryptography, p.20, 2003.
DOI : 10.1201/9781420071474

S. Weis, S. Sarma, R. Rivest, and D. Engels, Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems, Security in Pervasive Computing, pp.50-59, 2004.
DOI : 10.1007/978-3-540-39881-3_18

D. Zanetti, P. Sachs, and S. Capkun, On the Practicality of UHF RFID Fingerprinting: How Real is the RFID Tracking Problem?, Proceedings of the 11th international conference on Privacy enhancing technologies, pp.97-116, 2011.
DOI : 10.1007/978-3-642-22263-4_6