메뉴 건너뛰기




Volumn , Issue , 2004, Pages 447-456

Benchmarking block ciphers for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BANDWIDTH; BENCHMARKING; CRYPTOGRAPHY; ENERGY EFFICIENCY; SENSORS;

EID: 20344392154     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (43)

References (33)
  • 1
    • 20344401276 scopus 로고    scopus 로고
    • Specification of the 3GPP confidentiality and integrity algorithms document 2: KASUMI specification
    • 3rd Generation Partnership Project. Dec
    • 3rd Generation Partnership Project. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2: KASUMI Specification. ETSI/SAGE Specification Version: 1.0, Dec 1999.
    • (1999) ETSI/SAGE Specification Version: 1.0
  • 2
  • 4
    • 0010461175 scopus 로고    scopus 로고
    • Constraints and approaches for distributed sensor network security
    • NAI Labs
    • D. Carman, P. Kruus, and B. Matt. Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs, 2000.
    • (2000) Technical Report #00-010 , vol.10
    • Carman, D.1    Kruus, P.2    Matt, B.3
  • 6
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • . USENIX Association
    • S. Crosby and D. Wallach. Denial of service via algorithmic complexity attacks. In 12th USENIX Security Symposium, pages 29-44. USENIX Association, 2003.
    • (2003) 12th USENIX Security Symposium , pp. 29-44
    • Crosby, S.1    Wallach, D.2
  • 7
    • 20344367958 scopus 로고    scopus 로고
    • Web page, May
    • Cryptography Research and Evaluation Committee, Information-Technology Promotion Agency, Japan. E-government recommended ciphers list. Web page, May 2003.
    • (2003) E-government Recommended Ciphers List
  • 9
    • 33745288858 scopus 로고    scopus 로고
    • Comparing MISTY1 and KASUMI
    • Computer Science Department, Technion, Dec.
    • O. Dunkelman. Comparing MISTY1 and KASUMI. NESSIE Public Report NES/DOC/TEC/WP5/029/a, Computer Science Department, Technion, Dec. 2002.
    • (2002) NESSIE Public Report NES/DOC/TEC/WP5/029/a
    • Dunkelman, O.1
  • 10
    • 84921507607 scopus 로고    scopus 로고
    • A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and SHACAL-2 compared
    • University of Trento
    • F. Granelli and G. Boato. A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and SHACAL-2 compared. Technical Report DIT-04-004, University of Trento, 2004.
    • (2004) Technical Report , vol.DIT-04-004
    • Granelli, F.1    Boato, G.2
  • 15
    • 13244285777 scopus 로고    scopus 로고
    • Network Embedded Systems Technology, Winter 2003 Retreat, January 15-17
    • R. Kling. Intel® Research mote. Network Embedded Systems Technology, Winter 2003 Retreat, January 15-17, 2003. http://webs.cs.berkeley.edu/retreat-1- 03/slides/imote-nest-q103-03-dist%.ppt.
    • (2003) Intel® Research Mote
    • Kling, R.1
  • 17
    • 20344364107 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Centre for Telematics and Information Technology, University of Twente, The Netherlands
    • Y. Law, J. Doumen, and P. Hartel. Survey and benchmark of block ciphers for wireless sensor networks. Technical Report TR-CTIT-04-07, Centre for Telematics and Information Technology, University of Twente, The Netherlands, 2004.
    • (2004) Technical Report , vol.TR-CTIT-04-07
    • Law, Y.1    Doumen, J.2    Hartel, P.3
  • 18
    • 1542267055 scopus 로고    scopus 로고
    • Assessing security-critical energy-efficient sensor networks
    • Centre for Telematics and Information Technology, University of Twente, The Netherlands, July
    • Y. Law, S. Dulman, S. Etalle, and P. Havinga. Assessing Security-Critical Energy-Efficient Sensor Networks. Technical Report TR-CTIT-02-18, Centre for Telematics and Information Technology, University of Twente, The Netherlands, July 2002.
    • (2002) Technical Report , vol.TR-CTIT-02-18
    • Law, Y.1    Dulman, S.2    Etalle, S.3    Havinga, P.4
  • 19
    • 84947904428 scopus 로고    scopus 로고
    • New block encryption algorithm MISTY
    • E. Biham, editor, volume 1267 of LNCS. Springer-Verlag
    • M. Matsui. New Block Encryption Algorithm MISTY. In E. Biham, editor, Fast Software Encryption, 4th International Workshop, FSE '97, volume 1267 of LNCS, pages 54-68. Springer-Verlag, 1997.
    • (1997) Fast Software Encryption, 4th International Workshop, FSE '97 , pp. 54-68
    • Matsui, M.1
  • 21
    • 20344372367 scopus 로고    scopus 로고
    • Master's thesis, University of Twente, Apr.
    • J. Mulder. PEEROS: PreEmptive Eyes Real-Time Operating System. Master's thesis, University of Twente, Apr. 2003. http://wwwhome.cs.utwente.nl/~hoesel/ EyesOS/PeerOS%20Report-Job%20Mul%der.pdf.
    • (2003) PEEROS: PreEmptive Eyes Real-Time Operating System
    • Mulder, J.1
  • 23
    • 20344371167 scopus 로고    scopus 로고
    • A description of the MISTY1 encryption algorithm
    • Network Working Group, IETF, Nov.
    • H. Ohta and M. Matsui. A Description of the MISTY1 Encryption Algorithm. RFC 2994, Network Working Group, IETF, Nov. 2000.
    • (2000) RFC , vol.2994
    • Ohta, H.1    Matsui, M.2
  • 25
    • 84979021449 scopus 로고    scopus 로고
    • Cryptographic primitives for information authentication - State of the an
    • B. Preneel and V. Rijmen, editors, State of the Art in Appplied Cryptography. Springer-Verlag
    • B. Preneel. Cryptographic primitives for information authentication - state of the an. In B. Preneel and V. Rijmen, editors, State of the Art in Appplied Cryptography, volume 1528 of LNCS, pages 50-105. Springer-Verlag, 1998.
    • (1998) LNCS , vol.1528 , pp. 50-105
    • Preneel, B.1
  • 33
    • 0036343658 scopus 로고    scopus 로고
    • An energy-efficient mac protocol for wireless sensor networks
    • New York, NY, USA, June. USC/Information Sciences Institute, IEEE.
    • W. Ye, J. Heidemann, and D. Estrin. An Energy-Efficient MAC protocol for Wireless Sensor Networks. In Proc. IEEE Infocom, pages 1567-1576, New York, NY, USA, June 2002. USC/Information Sciences Institute, IEEE.
    • (2002) Proc. IEEE Infocom , pp. 1567-1576
    • Ye, W.1    Heidemann, J.2    Estrin, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.