Cryptography Engine Design for IEEE 1609.2 WAVE Secure Vehicle Communication using FPGA
暂无分享,去创建一个
[1] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[2] Brian A. Carter,et al. Advanced Encryption Standard , 2007 .
[3] Yunpeng Wang,et al. Throughput and Delay Limits of 802.11p and its Influence on Highway Capacity , 2013 .
[4] Vasilios I. Kelefouras,et al. On the exploitation of a high-throughput SHA-256 FPGA design for HMAC , 2012, TRETS.
[5] Zoubir Mammeri,et al. Authentication and consensus overhead in vehicular ad hoc networks , 2013, Telecommun. Syst..
[6] Miguel Morales-Sandoval,et al. On the hardware design of an elliptic curve cryptosystem , 2004, Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004..
[7] Torsten Schütze,et al. Automotive Security : Cryptography for Car 2 X Communication , 2011 .
[8] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[9] Tao Zhang,et al. Vehicle Safety Communications - Protocols, Security, and Privacy , 2012, Wiley series on information and communication technology.
[10] Haeyoung Rha,et al. Efficient Pipelined Multistream AES CCMP Architecture for Wireless LAN , 2012, 2012 International Conference on Information Science and Applications.
[11] Youngmin Kim,et al. Implementation of efficient SHA-256 hash algorithm for secure vehicle communication using FPGA , 2014, 2014 International SoC Design Conference (ISOCC).
[12] Ignacio Algredo-Badillo,et al. Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard , 2010, Comput. Electr. Eng..
[13] Rommel García,et al. A compact FPGA-based processor for the Secure Hash Algorithm SHA-256 , 2014, Comput. Electr. Eng..
[14] Máire O'Neill,et al. WLAN security processor , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[15] Morris Dworkin,et al. Special Publication 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2003 .
[16] Guillermo Acosta-Marum,et al. Wave: A tutorial , 2009, IEEE Communications Magazine.
[17] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[18] Morris J. Dworkin. SP 800-38C. Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality , 2004 .
[19] Dirk Fox,et al. Digital Signature Standard (DSS) , 2001, Datenschutz und Datensicherheit.
[20] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .