This document consists of a collection of attacks upon RFID protocols and is meant to serve as a quick and easy reference. This document will be updated as new attacks are found. Currently the only attacks on protocols shown are the authors\u27 original attacks with references to similar attacks on other
protocols.
The main security properties considered are authentication, untraceability, and - for stateful protocols - desynchronization resistance