1. M. Aigner and M. Feldhofer. Secure symmetric authentication for RFID tags, March 8–9, 2005, Graz, Austria. Telecommunication and Mobile Computing - TCMC, 2005
2. G. Avoine, E. Dysli, and P. Oechslin. Reducing time complexity in RFID systems. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography - SAC 2005, volume LNCS 3897, pp. 291–306, Springer, Berlin, 2005
3. S. Babbage, D. Catalano, L. Granboulan, A. Lenstra, C. Paar, J. Pelzl, T. Pornin, B. Preneel, M. Robshaw, A. Rupp, N. Smart, and M. Ward. ECRYPT Yearly Report on Algorithms and Keysizes (2004). Technical Report D.SPA.10, ECRYPT - European Network of Excellence in Crpytology, March 1, 2005. Revision 1.0. Available at http://www.ecrypt.eu.org/documents.html
4. L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede. Public key cryptography for RFID-tags. Printed Handout of Workshop on RFID Security - RFIDSec 06, July 2006. Available at http://events.iaik.tugraz.at/RFIDSec06/Program/index.htm
5. L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede. Low-cost elliptic curve cryptography for wireless sensor networks. In L. Buttyán, V. D. Gligor, and D. Westhoff, editors, Security and Privacy in Ad-Hoc and Sensor Networks - ESAS 2006, volume LNCS 4357, pp. 6–17, Springer, Berlin, September 20–21, 2006