Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance
暂无分享,去创建一个
[1] Yee Wei Law,et al. KLEIN: A New Family of Lightweight Block Ciphers , 2010, RFIDSec.
[2] Jong-Nam Kim,et al. Symmetry structured SPN block cipher algorithm , 2009, 2009 11th International Conference on Advanced Communication Technology.
[3] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting , 2010 .
[4] Yan Zhang,et al. RFID Security: Techniques, Protocols and System-On-Chip Design , 2008 .
[5] Emin Anarim,et al. Security flaws in a recent RFID delegation protocol , 2011, Personal and Ubiquitous Computing.
[6] Kenji Ohkuma,et al. Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis , 2009, Selected Areas in Cryptography.
[7] Andrey Bogdanov,et al. PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.
[8] Jongsung Kim,et al. HIGHT: A New Block Cipher Suitable for Low-Resource Device , 2006, CHES.
[9] Aikaterini Mitrokotsa,et al. Classifying RFID attacks and defenses , 2010, Inf. Syst. Frontiers.
[10] Cihangir Tezcan,et al. Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT , 2009, ACISP.
[11] Mazdak Zamani,et al. A confidential RFID model to prevent unauthorized access , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[12] Christophe De Cannière,et al. KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers , 2009, CHES.
[13] Vincent Rijmen,et al. AES implementation on a grain of sand , 2005 .
[14] Guang Gong,et al. Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices , 2010, Financial Cryptography Workshops.
[15] Damith C. Ranasinghe,et al. Networked RFID Systems and Lightweight Cryptography , 2008 .
[16] Mazdak Zamani,et al. A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[17] Joo Yeon Cho,et al. Linear Cryptanalysis of Reduced-Round PRESENT , 2010, CT-RSA.
[18] Simon J. Shepherd,et al. The Tiny Encryption Algorithm , 2007, Cryptologia.
[19] Christof Paar,et al. Lightweight Cryptography and RFID: Tackling the Hidden Overhead , 2009, KSII Trans. Internet Inf. Syst..
[20] M. Janbeglou,et al. Redirecting network traffic toward a fake DNS server on a LAN , 2010, 2010 3rd International Conference on Computer Science and Information Technology.