A review on lightweight cryptography algorithms for data security and authentication in IoTs
暂无分享,去创建一个
[1] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[2] Ong Bi Lynn,et al. Internet of Things (IoT): Taxonomy of security attacks , 2016, 2016 3rd International Conference on Electronic Design (ICED).
[3] Sugata Sanyal,et al. Survey of Security and Privacy Issues of Internet of Things , 2015, ArXiv.
[4] Kai Zhao,et al. A Survey on the Internet of Things Security , 2013, 2013 Ninth International Conference on Computational Intelligence and Security.
[5] Muhammad Babar,et al. Applications and Challenges Faced by Internet of Things - A Survey , 2016 .
[6] Christof Paar,et al. A Survey of Lightweight-Cryptography Implementations , 2007, IEEE Design & Test of Computers.
[7] Isha,et al. Analysis of Lightweight Cryptographic Solutions for Internet of Things , 2016 .
[8] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[9] Sarmad Ullah Khan,et al. Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges , 2012, 2012 10th International Conference on Frontiers of Information Technology.
[10] Noen Given. RECTANGLE : A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms , 2015 .
[11] Prabhat Kumar,et al. A Survey on Lightweight Block Ciphers , 2014 .
[12] Eleonora Borgia,et al. The Internet of Things vision: Key features, applications and open issues , 2014, Comput. Commun..
[13] Matt Henricksen,et al. EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption , 2011, CANS.
[14] Dindayal Mahto,et al. Security Analysis of Elliptic Curve Cryptography and RSA , 2016 .
[15] Toru Akishita,et al. Very Compact Hardware Implementations of the Blockcipher CLEFIA , 2011, Selected Areas in Cryptography.
[16] Christof Paar,et al. Pushing the Limits: A Very Compact and a Threshold Implementation of AES , 2011, EUROCRYPT.
[17] H. K. Srivastava,et al. Performance Based Comparison Study of RSA and Elliptic Curve Cryptography , 2013 .
[18] Akashi Satoh,et al. Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES , 2003, ISC.
[19] Jason Smith,et al. The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[20] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[21] Jaydip Sen,et al. Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .
[22] Miao Wu,et al. Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[23] Kyoji Shibutani,et al. The 128-Bit Blockcipher CLEFIA (Extended Abstract) , 2007, FSE.
[24] Sanjay Bhargava,et al. Analysis of Cryptographic Algorithms for Network Security , 2013 .
[25] Ramjee Prasad,et al. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges , 2010, CNSA.
[26] Kazuhiko Minematsu,et al. $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.
[27] O. Saeed,et al. Towards Internet of Things: Survey and Future Vision , 2013 .
[28] Anurag Agarwal,et al. The Internet of Things—A survey of topics and trends , 2015, Inf. Syst. Frontiers.
[29] Rodrigo Roman,et al. Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..
[30] Qinghan Xiao,et al. RFID Technology, Security Vulnerabilities, and Countermeasures , 2009 .
[31] Jongsung Kim,et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.