On the Hardware Implementation Efficiency of Cryptographic Primitives
暂无分享,去创建一个
Cristina Alcaraz | Rodrigo Roman | Nicolas Sklavos | Jianying Zhou | Javier Lopez | R. Román | Jianying Zhou | N. Sklavos | Cristina Alcaraz | Javier López
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[3] Matt Brown,et al. Invited talk , 2007 .
[4] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[5] Haodong Wang,et al. Efficient Implementation of Public Key Cryptosystems on MIC Az and TelosB Motes , 2006 .
[6] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[7] Kazumaro Aoki,et al. Fast Implementations of AES Candidates , 2000, AES Candidate Conference.
[8] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[9] Bart Preneel,et al. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..
[10] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[11] Christof Paar,et al. Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? , 2006 .
[12] Johannes Wolkerstorfer. Scaling ECC Hardware to a Minimum , 2005 .
[13] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[14] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[15] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[16] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.
[17] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[18] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[19] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[20] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[21] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[22] Mitsuru Matsui,et al. Performance Analysis and Parallel Implementation of Dedicated Hash Functions , 2002, EUROCRYPT.
[23] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[24] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[25] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[26] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[27] Bruce Schneier,et al. The Twofish encryption algorithm: a 128-bit block cipher , 1999 .