IoT Security : Performance Evaluation of Grain , MICKEY , and Trivium-Lightweight Stream Ciphers
暂无分享,去创建一个
[1] Dipanwita Roy Chowdhury,et al. Differential Fault Analysis of MICKEY-128 2.0 , 2013, 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography.
[2] Wen-Feng Qi,et al. Improved conditional differential attacks on Grain v1 , 2017, IET Inf. Secur..
[3] Debdeep Mukhopadhyay,et al. A Combined Power and Fault Analysis Attack on Protected Grain Family of Stream Ciphers , 2017, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[4] Fred Piper,et al. Stream Ciphers , 1982, EUROCRYPT.
[5] B. Preneel,et al. Trivium Specifications ? , 2022 .
[6] Ahmad-Reza Sadeghi,et al. Security analysis on consumer and industrial IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).
[7] Martin Hell,et al. A Stream Cipher Proposal: Grain-128 , 2006, 2006 IEEE International Symposium on Information Theory.
[8] Vincent Rijmen,et al. The eSTREAM Portfolio , 2008 .
[9] Christof Paar,et al. Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers , 2008, 2008 International Symposium on Industrial Embedded Systems.
[10] Amir Akbari,et al. Grain and Trivium ciphers implementation algorithm in FPGA chip and AVR micro controller , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).
[11] Mohey M. Hadhoud,et al. Studying the Effects of Most Common Encryption Algorithms , 2011, Int. Arab. J. e Technol..
[12] Nozomu Togawa,et al. Scan-based attack against Trivium stream cipher independent of scan structure , 2013, 2013 IEEE 10th International Conference on ASIC.
[13] Nicky Mouha,et al. Report on Lightweight Cryptography , 2017 .
[14] Saad Islam,et al. Cube attack on Trivium and A5/1 stream ciphers , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[15] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[16] Martin Hell,et al. Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..