A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes
暂无分享,去创建一个
[1] Kazumaro Aoki,et al. Fast Implementations of AES Candidates , 2000, AES Candidate Conference.
[2] Cristina Alcaraz,et al. Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios , 2006, CRITIS.
[3] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[4] Hans Eberle,et al. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[7] David A. Wagner,et al. Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.
[8] Peng Ning,et al. TinySeRSync: secure and resilient time synchronization in wireless sensor networks , 2006, CCS '06.
[9] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[10] Christof Paar,et al. Are standards compliant Elliptic Curve Cryptosystems feasible on RFID ? , 2006 .
[11] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[12] Ingrid Verbauwhede,et al. Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.
[13] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[14] Chen-Mou Cheng,et al. Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems , 2006, SPC.
[15] John A. Stankovic,et al. AMSecure: secure link-layer communication in TinyOS for IEEE 802.15.4-based wireless sensor networks , 2006, SenSys '06.
[16] Berk Sunar,et al. Cryptography on a Speck of Dust , 2007, Computer.
[17] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[18] Frank Mueller,et al. Analyzing and modeling encryption overhead for sensor network nodes , 2003, WSNA '03.
[19] Haodong Wang,et al. Efficient Implementation of Public Key Cryptosystems on MIC Az and TelosB Motes , 2006 .
[20] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[21] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[22] Johannes Wolkerstorfer,et al. Scaling ECC Hardware to a Minimum , 2005 .
[23] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[24] Bart Preneel,et al. Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations , 2005, IACR Cryptol. ePrint Arch..
[25] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Yee Wei Law,et al. Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.
[28] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[29] Bruce Schneier,et al. The Twofish encryption algorithm: a 128-bit block cipher , 1999 .
[30] John A. Stankovic,et al. Poster Abstract : AMSecure — Secure Link-Layer Communication in TinyOS for IEEE 802 . 15 . 4-based Wireless Sensor Networks , 2006 .
[31] Berk Sunar,et al. State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[32] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[33] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[34] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[35] Kyung Jun Choi,et al. Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.