A new lightweight hybrid cryptographic algorithm for the internet of things
暂无分享,去创建一个
[1] Paul C. van Oorschot,et al. A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.
[2] Willi Meier,et al. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.
[3] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[4] François Arnault,et al. F-FCSR Stream Ciphers , 2008, The eSTREAM Finalists.
[5] Chingwo Ma,et al. A simple Hankel interpretation of the Berlekamp-Massey algorithm , 1989 .
[6] C. G. Giinther. ALTERNATING STEP GENERATORS CONTROLLED BY DE BRUIJN SEQUENCES , 1988 .
[7] Mark Goresky,et al. 2-Adic Shift Registers , 1993, FSE.
[8] Caroline Fontaine. Shrinking Generator , 2011, Encyclopedia of Cryptography and Security.
[9] Florian Michahelles,et al. Architecting the Internet of Things , 2011 .
[10] Xilinx Family. Efficient Shift Registers, LFSR Counters, and Long Pseudo- Random Sequence Generators , 1996 .
[11] Lin Li,et al. Fast correlation attack on stream cipher ABC v3 , 2008, Science in China Series F: Information Sciences.
[12] Artemis Moroni,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[13] Mark Goresky,et al. Cryptanalysis Based on 2-Adic Rational Approximation , 1995, CRYPTO.
[14] Alex Biryukov,et al. Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.
[15] Ko-ming Chiu,et al. The Cryptanalysis of LFSR/FCSR Based Alternating Step Generator , 2006, 2006 International Conference on Computer Engineering and Systems.
[16] Caroline Fontaine. Self-Shrinking Generator , 2005, Encyclopedia of Cryptography and Security.
[17] Thomas Johansson. Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators , 1998, ASIACRYPT.
[18] P. L’Ecuyer,et al. Supplement to On the Distribution of k-Dimensional Vectors for Simple and Combined Tausworthe Sequences , 1991 .
[19] Peter Alfke,et al. Efficient Shift Registers, LFSR Counters, and Long Pseudo Random Sequence Generators , 1995 .
[20] Maurizio Tomasella,et al. Vision and Challenges for Realising the Internet of Things , 2010 .
[21] Berry Schoenmakers,et al. State Recovery Attacks on Pseudorandom Generators , 2005, WEWoRC.
[22] Christof Paar,et al. A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.
[23] Ziad Alqadi,et al. Analysis of Stream Cipher Security Algorithm , 2007 .