This document provides a survey of RFID authentication protocols that are based on hash-chain methods. It discusses several protocols that have been proposed to address security and privacy issues in RFID communications by employing hash chains. The survey compares 10 different protocols, summarizing their use of hash chains, objectives, limitations, and vulnerabilities. Overall, the survey aims to provide a comparative analysis of hash-chain based RFID authentication protocols in order to better understand their approaches and limitations for enhancing RFID security and privacy.