Performance and energy efficiency of block ciphers in personal digital assistants
暂无分享,去创建一个
Scott F. Midkiff | Jung-Min Park | Thomas L. Martin | Creighton T. R. Hager | S. Midkiff | J. Park | T. L. Martin
[1] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[2] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] Sharad Malik,et al. Power analysis of embedded software: a first step towards software power minimization , 1994, IEEE Trans. Very Large Scale Integr. Syst..
[5] Bruce Schneier,et al. Related-Key Cryptanalysis of 3-WAY , 1997 .
[6] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[7] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[8] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[9] Mahadev Satyanarayanan,et al. PowerScope: a tool for profiling the energy usage of mobile applications , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[10] Luca Benini,et al. Energy-efficient design of battery-powered embedded systems , 1999, Proceedings. 1999 International Symposium on Low Power Electronics and Design (Cat. No.99TH8477).
[11] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[12] V Naithani,et al. Estimation of Organochlorine Pesticide Residues in Two Popular Spices Extensively Used as Herbal Tea Ingredients in India , 2006, Bulletin of environmental contamination and toxicology.
[13] Ron Rivest. A Description of the RC2(r) Encryption Algorithm , 1998, RFC.
[14] Lawrence E. Bassham. Efficiency Testing of ANSI C Implementations of Round 2 Candidate Algorithms for the Advanced Encryption Standard , 2000, AES Candidate Conference.
[15] Jan M. Rabaey,et al. Which has greater potential power impact: high-level design and algorithms or innovative low power technology? (panel) , 1996, International Symposium on Low Power Electronics and Design.
[16] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Duncan S. Wong,et al. The performance measurement of cryptographic primitives on palm devices , 2001, Seventeenth Annual Computer Security Applications Conference.