-
1
-
-
0035242946
-
Vibration-to-electric energy conversion
-
Meininger, S., Mur-Miranda, J., Amirtharajah, R., Chandrakasan, A., Lang, J.: Vibration-to-electric energy conversion. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 9(1) (2001) 64-76
-
(2001)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.9
, Issue.1
, pp. 64-76
-
-
Meininger, S.1
Mur-Miranda, J.2
Amirtharajah, R.3
Chandrakasan, A.4
Lang, J.5
-
2
-
-
0032074435
-
Self-powered signal processing using vibration-based power generation
-
Amirtharajah, R., Chandrakasan, A.P.: Self-powered signal processing using vibration-based power generation. IEEE Journal of Solid-State Circuits 33(5) (1998) 687-695
-
(1998)
IEEE Journal of Solid-state Circuits
, vol.33
, Issue.5
, pp. 687-695
-
-
Amirtharajah, R.1
Chandrakasan, A.P.2
-
3
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J.D., Wen, V., Culler, D.E.: SPINS: security protocols for sensor networks. Wireless Networks 8(5) (2002) 521-534
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
4
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
New York, ACM Press
-
Karlof, C., Sastry, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004), New York, ACM Press (2004) 162-175
-
(2004)
Second ACM Conference on Embedded Networked Sensor Systems (SenSys 2004)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
5
-
-
0003508558
-
-
National Institute of Standards and Technology (NIST) FIPS Publication 197
-
National Institute of Standards and Technology (NIST) FIPS Publication 197: Advanced Encryption Standard (AES). (2001)
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
7
-
-
15744371681
-
Encryption algorithms comparisons for wireless networked sensors
-
Luo, X., Zheng, K., Pan, Y., Wu, Z.: Encryption algorithms comparisons for wireless networked sensors. In: IEEE International Conference on Systems, Man and Cybernetics. Volume 2. (2004) 1142-1146
-
(2004)
IEEE International Conference on Systems, Man and Cybernetics
, vol.2
, pp. 1142-1146
-
-
Luo, X.1
Zheng, K.2
Pan, Y.3
Wu, Z.4
-
8
-
-
0842289234
-
Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
-
IEEE
-
Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: GLOBECOM'03. Volume 3., IEEE (2003) 1445-1449
-
(2003)
GLOBECOM'03
, vol.3
, pp. 1445-1449
-
-
Prasithsangaree, P.1
Krishnamurthy, P.2
-
9
-
-
0038300424
-
A highly regular and scalable AES hardware architecture
-
Mangard, S., Aigner, M., Dominikus, S.: A highly regular and scalable AES hardware architecture. IEEE Transactions on Computers 52(4) (2003) 483-491
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.4
, pp. 483-491
-
-
Mangard, S.1
Aigner, M.2
Dominikus, S.3
-
10
-
-
27244443921
-
AES on FPGA from the fastest to the smallest
-
CHES 2005, Springer
-
Good, T., Benaissa, M.: AES on FPGA from the fastest to the smallest. In: CHES 2005. Volume 3659 of LNCS., Springer (2005) 427-440
-
(2005)
LNCS
, vol.3659
, pp. 427-440
-
-
Good, T.1
Benaissa, M.2
-
11
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
CHES 2004, Springer
-
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES 2004. Volume 3156 of LNCS., Springer (2004) 357-370
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
12
-
-
33746739905
-
AES implementation on a grain of sand
-
Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. Information Security, IEE Proceedings 152(1) (2005) 13-20
-
(2005)
Information Security, IEE Proceedings
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
14
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
-
ISC 2002, Springer-Verlag
-
Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In: ISC 2002. Volume 2433 of LNCS., Springer-Verlag (2002) 75-89
-
(2002)
LNCS
, vol.2433
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
15
-
-
0013091373
-
-
National Institute of Standards and Technology (NIST) FIPS Publication 198
-
National Institute of Standards and Technology (NIST) FIPS Publication 198: The Keyed-Hash Message Authentication Code (HMAC). (2002)
-
(2002)
The Keyed-Hash Message Authentication Code (HMAC)
-
-
-
16
-
-
80052378761
-
Cryptography: Theory and practice
-
3 edn. Chapman & Hall/CRC
-
Stinson, D.R.: Cryptography: Theory and Practice. 3 edn. Volume 36 of Discrete Mathematics and its Appications. Chapman & Hall/CRC (2005)
-
(2005)
Discrete Mathematics and Its Appications
, vol.36
-
-
Stinson, D.R.1
-
17
-
-
0004246335
-
-
National Institute of Standards and Technology (NIST) FIPS Publication 81
-
National Institute of Standards and Technology (NIST) FIPS Publication 81: DES modes of operation. (1980)
-
(1980)
DES Modes of Operation
-
-
-
18
-
-
0003928877
-
-
National Institute of Standards and Technology (NIST) FIPS Publication 113
-
National Institute of Standards and Technology (NIST) FIPS Publication 113: Computer Data Authentication. (1985)
-
(1985)
Computer Data Authentication
-
-
-
20
-
-
4043055208
-
-
Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France
-
Handschuh, H., Naccache, D.: SHACAL. Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France (2000)
-
(2000)
SHACAL
-
-
Handschuh, H.1
Naccache, D.2
-
21
-
-
33646169084
-
-
Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France
-
Handschuh, H., Naccache, D.: SHACAL: a family of block ciphers. Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France (2001)
-
(2001)
SHACAL: A Family of Block Ciphers
-
-
Handschuh, H.1
Naccache, D.2
-
22
-
-
84937572686
-
Analysis of SHA-1 in encryption mode
-
CT-RSA 2001, Springer Verlag
-
Handschuh, H., Knudsen, L.R., Robshaw, M.J.: Analysis of SHA-1 in encryption mode. In: CT-RSA 2001. Volume 2020 of LNCS., Springer Verlag (2001) 70-83
-
(2001)
LNCS
, vol.2020
, pp. 70-83
-
-
Handschuh, H.1
Knudsen, L.R.2
Robshaw, M.J.3
-
23
-
-
0242403489
-
Cryptanalysis of block ciphers based on SHA-1 and MD5
-
FSE 2003
-
Saarinen. M.J.O.: Cryptanalysis of block ciphers based on SHA-1 and MD5. In: FSE 2003. Volume 2887 of LNCS. (2003) 36-44
-
(2003)
LNCS
, vol.2887
, pp. 36-44
-
-
Saarinen, M.J.O.1
-
24
-
-
0003629990
-
-
National Institute of Standards and Technology (NIST) FIPS Publication 180-2
-
National Institute of Standards and Technology (NIST) FIPS Publication 180-2: Secure Hash Standard (SHS). (2002)
-
(2002)
Secure Hash Standard (SHS)
-
-
|