An Effective Lightweight Cryptographic Algorithm to Secure Resource-Constrained Devices
暂无分享,去创建一个
[1] Sathish Alampalayam Kumar,et al. Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).
[2] Vikash Kumar Jha. Cryptanalysis of Lightweight Block Ciphers , 2012 .
[3] Xiaojun Wang,et al. Application of Environmental Internet of Things on water quality management of urban scenic river , 2013 .
[4] Sharad Jash,et al. A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions , 2014 .
[5] Theodore Tryfonas,et al. The Internet of Things: a security point of view , 2016, Internet Res..
[6] Namhi Kang,et al. Fine-Grained Support of Security Services for Resource Constrained Internet of Things , 2016, Int. J. Distributed Sens. Networks.
[7] Stafford E. Tavares,et al. On the Design of S-Boxes , 1985, CRYPTO.
[8] Muhammad Usman,et al. SIT: A Lightweight Encryption Algorithm for Secure Internet of Things , 2017, ArXiv.
[9] Shreyank N. Gowda,et al. Innovative enhancement of the Caesar cipher algorithm for cryptography , 2016, 2016 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Fall).
[10] Alex Biryukov,et al. FELICS - Fair Evaluation of Lightweight Cryptographic Systems , 2015 .
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[13] Athanasios T. Karygiannis,et al. SP 800-98. Guidelines for Securing Radio Frequency Identification (RFID) Systems , 2007 .
[14] Yacine Challal,et al. On security issues in embedded systems: challenges and solutions , 2008, Int. J. Inf. Comput. Secur..
[15] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .