Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic
暂无分享,去创建一个
Guang Gong | Xinxin Fan | Mark Aagaard | Nusa Zidaric | G. Gong | Xinxin Fan | M. Aagaard | Nusa Zidaric
[1] Shuhong Gao,et al. Optimal normal bases , 1992, Des. Codes Cryptogr..
[2] M. Aagaard,et al. Hardware Implementations of Multi-output Welch-Gong Ciphers , .
[3] Guang Gong,et al. A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[4] Guang Gong,et al. The weakness of integrity protection for LTE , 2013, WiSec '13.
[5] E. Krengel,et al. Fast WG stream cipher , 2008, 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering.
[6] T. Itoh,et al. A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..
[7] Kazue Sako,et al. ECRYPT Stream Cipher Project , 2011, Encyclopedia of Cryptography and Security.
[8] Matthew J. B. Robshaw,et al. Cryptographic Hardware and Embedded Systems – CHES 2014 , 2014, Lecture Notes in Computer Science.
[9] Guang Gong,et al. WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..
[10] David Canright,et al. A Very Compact S-Box for AES , 2005, CHES.
[11] Guang Gong,et al. An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks , 2014 .
[12] A. M. Abdullah,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .
[13] Yasuyuki Nogami,et al. Mixed Bases for Efficient Inversion in F((22)2)2 and Conversion Matrices of SubBytes of AES , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Guang Gong,et al. WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.
[15] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[16] ItohToshiya,et al. A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases , 1988 .
[17] Guang Gong,et al. New Implementations of the WG Stream Cipher , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[18] Guang Gong,et al. The WG Stream Cipher , 2005 .
[19] Guang Gong,et al. Communication System Security , 2012 .