Power evaluation methods for data encryption algorithms
暂无分享,去创建一个
[1] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[2] Sagar Naik,et al. Software implementation strategies for power-conscious systems , 1999, Mobile Networks and Computing.
[3] Sang H. Dhong,et al. A cycle accurate power estimation tool , 2006, Asia and South Pacific Conference on Design Automation, 2006..
[4] Mahadev Satyanarayanan,et al. PowerScope: a tool for profiling the energy usage of mobile applications , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Sharad Malik,et al. Power analysis of embedded software: a first step towards software power minimization , 1994, IEEE Trans. Very Large Scale Integr. Syst..
[6] Prashant Krishnamurthy,et al. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[7] Mika Kuulusa,et al. Optimizing Mobile Software with Built-in Power Profiling , 2007 .
[8] Sagar Naik,et al. Software Implementation Strategies for Power-Conscious Systems , 2001, Mob. Networks Appl..
[9] C. Adams,et al. DESIGNING S-BOXES FOR CIPHERS RESISTANT TO DIFFERENTIAL CRYPTANALYSIS ( Extended , 1993 .
[10] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[11] S. Godsill,et al. The Institution of Engineering and Technology Seminar on Target Tracking and Data Fusion , 2008 .
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[13] Todd M. Austin,et al. SimpleScalar: An Infrastructure for Computer System Modeling , 2002, Computer.
[14] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[15] Scott F. Midkiff,et al. Performance and energy efficiency of block ciphers in personal digital assistants , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[16] Frank H. P. Fitzek,et al. Mobile Phone Programming: and its Application to Wireless Networking , 2007 .
[17] Stefan Tillich,et al. Energy evaluation of software implementations of block ciphers under memory constraints , 2007 .
[18] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[19] Johann Großschädl,et al. Energy Evaluation of Software Implementations of Block Ciphers under Memory Constraints , 2007, 2007 Design, Automation & Test in Europe Conference & Exhibition.
[20] Margaret Martonosi,et al. Wattch: a framework for architectural-level power analysis and optimizations , 2000, Proceedings of 27th International Symposium on Computer Architecture (IEEE Cat. No.RS00201).
[21] Jerry Avorn. Technology , 1929, Nature.
[22] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[23] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[24] Serge Vaudenay,et al. On the Weak Keys of Blowfish , 1996, FSE.
[25] Don Coppersmith,et al. The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..