Battery power-aware encryption
暂无分享,去创建一个
R. N. Uma | Rajarathnam Chandramouli | K. P. Subbalakshmi | Satish Bapatla | K.P. Subbalakshmi | R. Chandramouli | R. Uma | Satish Bapatla
[1] Anand Raghunathan,et al. Securing wireless data: system architecture challenges , 2002, 15th International Symposium on System Synthesis, 2002..
[2] Elaine B. Barker,et al. Status Report on the First Round of the Development of the Advanced Encryption Standard , 1999, Journal of Research of the National Institute of Standards and Technology.
[3] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[4] Ramesh Karri,et al. Optimizing the Energy Consumed by Secure Wireless Sessions – Wireless Transport Layer Security Case Study , 2003, Mob. Networks Appl..
[5] Anantha Chandrakasan,et al. Design and implementation of a scalable encryption processor with embedded variable DC/DC converter , 1999, DAC '99.
[6] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[7] Miodrag Potkonjak,et al. On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[8] Srivaths Ravi,et al. Analyzing the energy consumption of security protocols , 2003, ISLPED '03.
[9] Xuejia Lai,et al. On the design and security of block ciphers , 1992 .
[10] Nicolas Sklavos,et al. Asynchronous low power VLSI implementation of the International Data Encryption Algorithm , 2001, ICECS 2001. 8th IEEE International Conference on Electronics, Circuits and Systems (Cat. No.01EX483).
[11] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[12] David E. Culler,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[13] Ronald L. Rivest,et al. The RC4 encryption algorithm , 1992 .
[14] Anantha Chandrakasan,et al. Low power scalable encryption for wireless systems , 1998, Wirel. Networks.
[15] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[16] Rajarathnam Chandramouli,et al. Battery power optimized encryption , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[17] Ingrid Verbauwhede,et al. The energy cost of secrets in ad-hoc networks , 2002 .
[18] Ramesh Karri,et al. MINIMIZING THE SECURE WIRELESS SESSION ENERGY , 2001 .
[19] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[20] G. Dantzig. Discrete-Variable Extremum Problems , 1957 .
[21] Kannan Srinivasan,et al. State based key hop protocol: a lightweight security protocol for wireless networks , 2004, PE-WASUN '04.
[22] Liam Keliher,et al. Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES , 2004, AES Conference.
[23] Mitsuru Matsui,et al. Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.
[24] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[25] Mitsuru Matsui,et al. The First Experimental Cryptanalysis of the Data Encryption Standard , 1994, CRYPTO.
[26] Alex Biryukov,et al. The Boomerang Attack on 5 and 6-Round Reduced AES , 2004, AES Conference.
[27] Prashant Krishnamurthy,et al. Analysis of energy consumption of RC4 and AES algorithms in wireless LANs , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[28] Wu-chi Feng,et al. Lightweight security mechanisms for wireless video transmission , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[29] Eli Biham,et al. Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.
[30] S. W. Stratton,et al. The National Bureau of Standards , 1905, Transactions of the American Institute of Electrical Engineers.