Hardware Implementation of Bluetooth Security
暂无分享,去创建一个
[1] Odysseas G. Koufopavlou,et al. Random number generator architecture and VLSI implementation , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[2] Rainer A. Rueppel,et al. Linear Ciphers and Random Sequence Generators with Multiple Clocks , 1985, EUROCRYPT.
[3] Richard Barber. Security in a Mobile World - is Bluetooth the Answer? , 2001, Comput. Secur..
[4] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[5] Anantha P. Chandrakasan,et al. Low-power CMOS digital design , 1992 .
[6] Gaetano Borriello,et al. Disappearing Hardware , 2002, IEEE Pervasive Comput..
[7] Richard Barber. Security in a Mobile World Is Bluetooth the Answer? , 2000, Comput. Secur..
[8] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[9] James L. Massey. On the Optimality of SAFER + Diffusion , 1999 .
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Melvin A. Breuer,et al. Digital systems testing and testable design , 1990 .