-
1
-
-
20344401276
-
Specification of the 3GPP confidentiality and integrity algorithms document 2: KASUMI specification
-
3rd Generation Partnership Project. Dec
-
3rd Generation Partnership Project. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2: KASUMI Specification. ETSI/SAGE Specification Version: 1.0, Dec 1999.
-
(1999)
ETSI/SAGE Specification Version: 1.0
-
-
-
2
-
-
84949218850
-
Camellia: A 128-bit block cipher suitable for multiple platforms
-
D. Stinson and S. Tavares, editors, number 2012 in LNCS, 39-56. Springer-Verlag
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita. Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms. In D. Stinson and S. Tavares, editors, Proc. Selected Areas in Cryptography (SAC'00), number 2012 in LNCS, pages 39-56. Springer-Verlag, 2001.
-
(2001)
Proc. Selected Areas in Cryptography (SAC'00)
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
3
-
-
0012022902
-
-
Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita. Specification of Camellia - A 128-Bit Block Cipher. Specification Version 2.0, Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation, 2001.
-
(2001)
Specification of Camellia - a 128-Bit Block Cipher. Specification Version 2.0
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
4
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs
-
D. Carman, P. Kruus, and B. Matt. Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs, 2000.
-
(2000)
Technical Report #00-010
, vol.10
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
-
6
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
. USENIX Association
-
S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In 12th USENIX Security Symposium, pages 29-44. USENIX Association, 2003.
-
(2003)
12th USENIX Security Symposium
, pp. 29-44
-
-
Crosby, S.1
Wallach, D.2
-
7
-
-
20344367958
-
-
Web page, May
-
Cryptography Research and Evaluation Committee, Information-Technology Promotion Agency, Japan. E-government recommended ciphers list. Web page, May 2003.
-
(2003)
E-government Recommended Ciphers List
-
-
-
9
-
-
33745288858
-
Comparing MISTY1 and KASUMI
-
Computer Science Department, Technion, Dec.
-
O. Dunkelman. Comparing MISTY1 and KASUMI. NESSIE Public Report NES/DOC/TEC/WP5/029/a, Computer Science Department, Technion, Dec. 2002.
-
(2002)
NESSIE Public Report NES/DOC/TEC/WP5/029/a
-
-
Dunkelman, O.1
-
10
-
-
84921507607
-
A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and SHACAL-2 compared
-
University of Trento
-
F. Granelli and G. Boato. A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and SHACAL-2 compared. Technical Report DIT-04-004, University of Trento, 2004.
-
(2004)
Technical Report
, vol.DIT-04-004
-
-
Granelli, F.1
Boato, G.2
-
12
-
-
17544377081
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. S. J. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93-104, 2000.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.S.J.6
-
15
-
-
13244285777
-
-
Network Embedded Systems Technology, Winter 2003 Retreat, January 15-17
-
R. Kling. Intel® Research mote. Network Embedded Systems Technology, Winter 2003 Retreat, January 15-17, 2003. http://webs.cs.berkeley.edu/retreat-1- 03/slides/imote-nest-q103-03-dist%.ppt.
-
(2003)
Intel® Research Mote
-
-
Kling, R.1
-
17
-
-
20344364107
-
Survey and benchmark of block ciphers for wireless sensor networks
-
Centre for Telematics and Information Technology, University of Twente, The Netherlands
-
Y. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. Technical Report TR-CTIT-04-07, Centre for Telematics and Information Technology, University of Twente, The Netherlands, 2004.
-
(2004)
Technical Report
, vol.TR-CTIT-04-07
-
-
Law, Y.1
Doumen, J.2
Hartel, P.3
-
18
-
-
1542267055
-
Assessing security-critical energy-efficient sensor networks
-
Centre for Telematics and Information Technology, University of Twente, The Netherlands, July
-
Y. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing Security-Critical Energy-Efficient Sensor Networks. Technical Report TR-CTIT-02-18, Centre for Telematics and Information Technology, University of Twente, The Netherlands, July 2002.
-
(2002)
Technical Report
, vol.TR-CTIT-02-18
-
-
Law, Y.1
Dulman, S.2
Etalle, S.3
Havinga, P.4
-
19
-
-
84947904428
-
New block encryption algorithm MISTY
-
E. Biham, editor, volume 1267 of LNCS. Springer-Verlag
-
M. Matsui. New Block Encryption Algorithm MISTY. In E. Biham, editor, Fast Software Encryption, 4th International Workshop, FSE '97, volume 1267 of LNCS, pages 54-68. Springer-Verlag, 1997.
-
(1997)
Fast Software Encryption, 4th International Workshop, FSE '97
, pp. 54-68
-
-
Matsui, M.1
-
21
-
-
20344372367
-
-
Master's thesis, University of Twente, Apr.
-
J. Mulder. PEEROS: PreEmptive Eyes Real-Time Operating System. Master's thesis, University of Twente, Apr. 2003. http://wwwhome.cs.utwente.nl/~hoesel/ EyesOS/PeerOS%20Report-Job%20Mul%der.pdf.
-
(2003)
PEEROS: PreEmptive Eyes Real-Time Operating System
-
-
Mulder, J.1
-
22
-
-
0003618441
-
Report on the development of the Advanced Encryption Standard (AES)
-
NIST
-
J. Nechvatal, E. Barker, L. Bassham, W. Burr, M. Dworkin, J. Foti, and E. Roback. Report on the Development of the Advanced Encryption Standard (AES). Technical report, NIST, 2000.
-
(2000)
Technical Report
-
-
Nechvatal, J.1
Barker, E.2
Bassham, L.3
Burr, W.4
Dworkin, M.5
Foti, J.6
Roback, E.7
-
23
-
-
20344371167
-
A description of the MISTY1 encryption algorithm
-
Network Working Group, IETF, Nov.
-
H. Ohta and M. Matsui. A Description of the MISTY1 Encryption Algorithm. RFC 2994, Network Working Group, IETF, Nov. 2000.
-
(2000)
RFC
, vol.2994
-
-
Ohta, H.1
Matsui, M.2
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
. ACM Press
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking, pages 189-199. ACM Press, 2001.
-
(2001)
Proceedings of the 7th Ann. Int. Conf. on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
25
-
-
84979021449
-
Cryptographic primitives for information authentication - State of the an
-
B. Preneel and V. Rijmen, editors, State of the Art in Appplied Cryptography. Springer-Verlag
-
B. Preneel. Cryptographic primitives for information authentication - state of the an. In B. Preneel and V. Rijmen, editors, State of the Art in Appplied Cryptography, volume 1528 of LNCS, pages 50-105. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1528
, pp. 50-105
-
-
Preneel, B.1
-
29
-
-
84871442641
-
On communication security in wireless ad-hoc sensor networks
-
June
-
S. Slijepcevic, V. Tsiatsis, S. Zimbeck, M. Srivastava, and M. Potkonjak. On communication security in wireless ad-hoc sensor networks. In 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 139-144, June 2002.
-
(2002)
11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 139-144
-
-
Slijepcevic, S.1
Tsiatsis, V.2
Zimbeck, S.3
Srivastava, M.4
Potkonjak, M.5
-
33
-
-
0036343658
-
An energy-efficient mac protocol for wireless sensor networks
-
New York, NY, USA, June. USC/Information Sciences Institute, IEEE.
-
W. Ye, J. Heidemann, and D. Estrin. An Energy-Efficient MAC protocol for Wireless Sensor Networks. In Proc. IEEE Infocom, pages 1567-1576, New York, NY, USA, June 2002. USC/Information Sciences Institute, IEEE.
-
(2002)
Proc. IEEE Infocom
, pp. 1567-1576
-
-
Ye, W.1
Heidemann, J.2
Estrin, D.3
|