Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher
暂无分享,去创建一个
[1] Adrian Perrig,et al. PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[2] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Mihir Bellare,et al. Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques , 2000, ASIACRYPT.
[5] Hwajeong Seo,et al. Low-Power Encryption Algorithm Block Cipher in JavaScript , 2014, J. Inform. and Commun. Convergence Engineering.
[6] Richard Han,et al. Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .
[7] Chan-Yong Jin,et al. A Meta-analysis of the Relationship between Mediator Factors and Purchasing Intention in E-commerce Studies , 2014, J. Inform. and Commun. Convergence Engineering.
[8] JaeCheol Ha,et al. Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper) , 2011, SESS '11.
[9] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[10] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.