Increased protection of resource-constrained devices, such as radio frequency identification (RFID) systems, is in high
demand these days. For high-resource desktop PCs, current encryption techniques are sufficient. Access control systems, transaction banking systems, and payment systems are all examples of high-security applications where RFID technology are used.