A Novel Authenticated Cipher for RFID Systems
暂无分享,去创建一个
[1] Magdy A. Bayoumi,et al. A Low-Power Parallel Architecture for Finite Galois Field GF(2m) Arithmetic Operations for Elliptic Curve Cryptography , 2012, J. Low Power Electron..
[2] Christof Paar,et al. Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? , 2006 .
[3] G. P. Biswas,et al. DESIGN OF M OBILE PUBLIC KEY INFRASTRUCTURE (M-PKI)USING ELLIPTIC CURVE CRYPT OGRAPHY , 2013 .
[4] Daniel W. Engels,et al. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm , 2011, RFIDSec.
[5] Christophe De Cannière,et al. Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.
[6] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[7] Christof Paar,et al. Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents , 2008, CARDIS.
[8] Magdy A. Bayoumi,et al. A Flexible Architecture for Finite Field Galois Fields(2m) Arithmetic Processor , 2011, J. Low Power Electron..
[9] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[10] Martin Hell,et al. On Hardware-Oriented Message Authentication with Applications towards RFID , 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications.
[11] A. W. Roscoe,et al. New combinatorial bounds for universal hash functions , 2009, IACR Cryptol. ePrint Arch..
[12] Vipul Gupta,et al. A public-key cryptographic processor for RSA and ECC , 2004, Proceedings. 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors, 2004..
[13] Jun Feng,et al. Low-power hardware implementation of ECC processor suitable for low-cost RFID tags , 2008, 2008 9th International Conference on Solid-State and Integrated-Circuit Technology.
[14] Panu Hämäläinen,et al. Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core , 2006, 9th EUROMICRO Conference on Digital System Design (DSD'06).
[15] Martin Hell,et al. A New Version of Grain-128 with Authentication , 2011 .
[16] Markku-Juhani O. Saarinen. Cryptanalysis of Hummingbird-1 , 2010, FSE.
[17] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[18] Ingrid Verbauwhede,et al. Public-Key Cryptography on the Top of a Needle , 2007, 2007 IEEE International Symposium on Circuits and Systems.
[19] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[20] Berk Sunar,et al. Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic , 2004, CHES.