Energy evaluation of software implementations of block ciphers under memory constraints
暂无分享,去创建一个
[1] Mark Weiser. The computer for the 21st century , 1991 .
[2] Ross Anderson,et al. Serpent: A Proposal for the Advanced Encryption Standard , 1998 .
[3] David Seal,et al. ARM Architecture Reference Manual , 2001 .
[4] Guido Bertoni,et al. Efficient Software Implementation of AES on 32-Bit Platforms , 2002, CHES.
[5] Anantha Chandrakasan,et al. JouleTrack: a web based tool for software energy profiling , 2001, DAC '01.
[6] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[7] Armando Fox,et al. System Software for Ubiquitous Computing , 2022 .
[8] Johann Großschädl,et al. An Instruction Set Extension for Fast and Memory-Efficient AES Implementation , 2005, Communications and Multimedia Security.
[9] Ignas Niemegeers,et al. Ad hoc networking in future wireless communications , 2003 .
[10] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[11] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[12] Eli Biham,et al. A Fast New DES Implementation in Software , 1997, FSE.
[13] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[14] Scott F. Midkiff,et al. Performance and energy efficiency of block ciphers in personal digital assistants , 2005, Third IEEE International Conference on Pervasive Computing and Communications.