-
1
-
-
0037022136
-
On virtual private networks security design issues
-
Cheung K.H., and Misic J. On virtual private networks security design issues. Computer Networks 38 2 (2002) 165-179
-
(2002)
Computer Networks
, vol.38
, Issue.2
, pp. 165-179
-
-
Cheung, K.H.1
Misic, J.2
-
2
-
-
0036282473
-
-
O. Elkeelany et al., Performance analysis of IPsec protocol: encryption and authentication, in: IEEE Communications Conference (ICC 2002), 2002, pp. 1164-1168.
-
-
-
-
3
-
-
85084162744
-
-
S. Miltchev, S. Ioannidis, A. Keromytis, A study of the relative costs of network security protocols, in: Proceedings of USENIX 2002 Annual Technical Conference, Monterey, CA, June 2002.
-
-
-
-
4
-
-
33748555565
-
-
P. Ganesan et al., Analysing and modelling encryption overhead for sensor network nodes, in: Proceedings of WSAN'03, San Diego, California, USA, September 2003.
-
-
-
-
5
-
-
33748567162
-
-
S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, November 1998.
-
-
-
-
6
-
-
33748560848
-
-
S. Kent, R. Atkinson, IP Authentication Header, RFC 2402, November 1998.
-
-
-
-
7
-
-
33748576613
-
-
S. Kent, R. Atkinson, IP Encapsulating Security Payload (ESP), RFC 2406, November 1998.
-
-
-
-
10
-
-
33748520947
-
-
S. Frankel, R. Glenn, S. Kelly, The AES-CBC Cipher Algorithm and Its Use with IPsec, RFC 3602, September 2003.
-
-
-
-
11
-
-
2642584905
-
Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)
-
Phan R. Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES). Information Processing Letters 91 1 (2004) 33-38
-
(2004)
Information Processing Letters
, vol.91
, Issue.1
, pp. 33-38
-
-
Phan, R.1
-
13
-
-
33748545974
-
-
US National Bureau of Standards, Data Encryption Standard, Federal Information Processing Standard (FIPS) publication 46-2, December 1993. Available from: .
-
-
-
-
14
-
-
33748522058
-
-
R. Rivest, The MD5 Message-Digest Algorithm, RFC1321, April 1992.
-
-
-
-
15
-
-
33748528144
-
-
D. Eastlake, P. Jones, US Secure Hash Algorithm 1 (SHA1), RFC 3174, September 2001.
-
-
-
-
16
-
-
33748518938
-
-
C. Madson, R. Glenn, The Use of HMAC-MD5-96 within ESP and AH, RFC 2403, November 1998.
-
-
-
-
17
-
-
33748552719
-
-
C. Madson, R. Glenn, The Use of HMAC-SHA-1-96 within ESP and AH, RFC 2404, November 1998.
-
-
-
-
18
-
-
33748559511
-
-
National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS) publication 197, November 2001. Available from: .
-
-
-
-
19
-
-
33748548431
-
-
F. Granelli, G. Boato, A novel methodology for analysis of the computational complexity of block ciphers: Rijndael, Camellia and Shacal-2 compared, in: 3rd Conference on Security and Network Architectures (SAR'04), June 2004. Available from: .
-
-
-
-
21
-
-
67649903039
-
-
C. Lu, S. Tseng, Integrated Design of AES (Advanced Encryption Standard) Encrypter and Decrypter, in: Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures, and Processors (ASAP'02), 2002.
-
-
-
-
22
-
-
33748524559
-
-
ETSI, Universal Mobile Telecommunication System (UMTS); Selection Procedures for the Choice of Radio Transmission Technologies of the UMTS, Technical Report TR 101 112 v3.2.0,1998.
-
-
-
-
24
-
-
33748548095
-
-
3GPP TS 25.321 (v3.15.0), Medium Access Control (MAC) Protocol Specification, Release'99, March 2003.
-
-
-
-
25
-
-
33748529346
-
-
3GPP TS 25.322 (v3.6.0), Radio Link Control (RLC) Protocol Specification, Release'99, March 2001.
-
-
-
-
26
-
-
33748540113
-
-
3GPP TS 25.323 (v3.4.0), Packet Data Convergence Protocol (PDCP) Specification, Release'99, March 2001.
-
-
-
-
27
-
-
33748523874
-
-
ARM microprocessor solutions from ARM Ltd. Available from: .
-
-
-
|