A Comparative Study on Lightweight Cryptography
暂无分享,去创建一个
[1] Stephen Gardner,et al. Implementation of Elliptic-Curve Cryptography on Mobile Healthcare Devices , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.
[2] Debdeep Mukhopadhyay,et al. Cryptanalysis of Composite PUFs (Extended abstract-invited talk) , 2014, 18th International Symposium on VLSI Design and Test.
[3] Jean-Jacques Quisquater,et al. Practical Algebraic Attacks on the Hitag2 Stream Cipher , 2009, ISC.
[4] Guang Gong,et al. WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.
[5] Jacob John. Cryptography for Resource Constrained Devices: A Survey , 2012 .
[6] Ron Steinfeld,et al. Cryptanalysis of WG-7: a lightweight stream cipher , 2012, Cryptography and Communications.
[7] Goutam Paul,et al. (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher , 2012, Journal of Cryptology.
[8] Martin Novotný,et al. Breaking Hitag2 with Reconfigurable Hardware , 2011, 2011 14th Euromicro Conference on Digital System Design.
[9] Guang Gong,et al. A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[10] Joseph Lano,et al. Probabilistic Factors in the Sober-t Stream Ciphers , 2002 .
[11] Guang Gong,et al. WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..
[12] Adi Shamir,et al. Breaking Grain-128 with Dynamic Cube Attacks , 2011, IACR Cryptol. ePrint Arch..
[13] Alexander Maximov. Cryptanalysis of the "Grain" family of stream ciphers , 2006, ASIACCS '06.
[14] Philip Hawkes,et al. Primitive Specification for SOBER-128 , 2003, IACR Cryptol. ePrint Arch..
[15] Lei Hu,et al. Cube Cryptanalysis of Hitag2 Stream Cipher , 2011, CANS.
[16] T. E. Bjrstad. Cryptanalysis of Grain using Time / Memory / Data Tradeos , 2008 .
[17] Santanu Sarkar,et al. A Differential Fault Attack on the Grain Family of Stream Ciphers , 2012, CHES.
[18] Jian Xie,et al. An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[19] Dongdai Lin,et al. Some New Weaknesses in the RC4 Stream Cipher , 2013, WISA.