Practical attack on NLM-MAC scheme
暂无分享,去创建一个
[1] Rainer A. Rueppel,et al. Correlation Immunity and the Summation Generator , 1985, CRYPTO.
[2] Hoon-Jae Lee,et al. On an improved summation generator with 2-bit memory , 2000, Signal Process..
[3] HyeongRag Kim,et al. NLM-128, an Improved LM-Type Summation Generator with 2-Bit memories , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[4] HoonJae Lee,et al. Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher , 2011, ICHIT.
[5] Young Sil Lee,et al. RFID mutual authentication protocol with Unclonable RFID-tags , 2011, International Conference on Mobile IT Convergence.
[6] Daewan Han,et al. An algebraic attack on the improved summation generator with 2-bit memory , 2005, Inf. Process. Lett..
[7] Simon J. Shepherd,et al. Cryptanalysis of a summation generator with 2-bit memory , 2002, Signal Process..
[8] Young-Sil Lee,et al. Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[9] Hoon-Jae Lee,et al. NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks , 2012 .
[10] Lee-Ming Cheng,et al. Correlation properties of an improved summation generator with 2-bit memory , 2002, Signal Process..