Breaking NLM-MAC Generator
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. SFINKS: A synchronous stream cipher for restricted hardware environments , 2005 .
[2] Simon J. Shepherd,et al. Cryptanalysis of a summation generator with 2-bit memory , 2002, Signal Process..
[3] Young Sil Lee,et al. RFID mutual authentication protocol with Unclonable RFID-tags , 2011, International Conference on Mobile IT Convergence.
[4] Hoon-Jae Lee,et al. NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks , 2012 .
[5] HyeongRag Kim,et al. NLM-128, an Improved LM-Type Summation Generator with 2-Bit memories , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.
[6] Lee-Ming Cheng,et al. Correlation properties of an improved summation generator with 2-bit memory , 2002, Signal Process..
[7] HoonJae Lee,et al. Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher , 2011, ICHIT.
[8] Bartosz Zoltak,et al. VMPC One-Way Function and Stream Cipher , 2004, FSE.
[9] Bruce Schneier,et al. Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.
[10] Young-Sil Lee,et al. Mutual Authentication Protocol for Enhanced RFID Security and Anti-counterfeiting , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[11] Daewan Han,et al. An algebraic attack on the improved summation generator with 2-bit memory , 2005, Inf. Process. Lett..
[12] Hoon-Jae Lee,et al. On an improved summation generator with 2-bit memory , 2000, Signal Process..