On XTEA-based Encryption/Authentication Core for Wireless Pervasive Communication
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[2] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[3] Roger M. Needham,et al. TEA, a Tiny Encryption Algorithm , 1994, FSE.
[4] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[5] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[6] Xuejia Lai,et al. A Proposal for a New Block Encryption Standard , 1991, EUROCRYPT.
[7] Bruce Schneier,et al. Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES , 1996, CRYPTO.
[8] P. Israsena. Design and Implementation of Low Power Hardware Encryption for Low Cost Secure RFID Using TEA , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[9] Seokhie Hong,et al. Differential Cryptanalysis of TEA and XTEA , 2003, ICISC.
[10] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[11] Bruce Schneier,et al. Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.