메뉴 건너뛰기




Volumn 4097 LNCS, Issue , 2006, Pages 372-381

Energy comparison of AES and SHA-1 for ubiquitous computing

Author keywords

[No Author keywords available]

Indexed keywords

MICROPROCESSOR CHIPS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SENSORS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS; AUTHENTICATION; COMPLEX NETWORKS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; ENERGY EFFICIENCY; ENERGY UTILIZATION; INTELLIGENT BUILDINGS; MOBILE SECURITY; MULTIMEDIA SERVICES; NETWORK SECURITY; RADIO FREQUENCY IDENTIFICATION (RFID); SENSOR NODES; SOFTWARE RELIABILITY; WIRELESS SENSOR NETWORKS;

EID: 33749382575     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11807964_38     Document Type: Conference Paper
Times cited : (97)

References (24)
  • 2
    • 0032074435 scopus 로고    scopus 로고
    • Self-powered signal processing using vibration-based power generation
    • Amirtharajah, R., Chandrakasan, A.P.: Self-powered signal processing using vibration-based power generation. IEEE Journal of Solid-State Circuits 33(5) (1998) 687-695
    • (1998) IEEE Journal of Solid-state Circuits , vol.33 , Issue.5 , pp. 687-695
    • Amirtharajah, R.1    Chandrakasan, A.P.2
  • 5
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) FIPS Publication 197
    • National Institute of Standards and Technology (NIST) FIPS Publication 197: Advanced Encryption Standard (AES). (2001)
    • (2001) Advanced Encryption Standard (AES)
  • 8
    • 0842289234 scopus 로고    scopus 로고
    • Analysis of energy consumption of RC4 and AES algorithms in wireless LANs
    • IEEE
    • Prasithsangaree, P., Krishnamurthy, P.: Analysis of energy consumption of RC4 and AES algorithms in wireless LANs. In: GLOBECOM'03. Volume 3., IEEE (2003) 1445-1449
    • (2003) GLOBECOM'03 , vol.3 , pp. 1445-1449
    • Prasithsangaree, P.1    Krishnamurthy, P.2
  • 9
  • 10
    • 27244443921 scopus 로고    scopus 로고
    • AES on FPGA from the fastest to the smallest
    • CHES 2005, Springer
    • Good, T., Benaissa, M.: AES on FPGA from the fastest to the smallest. In: CHES 2005. Volume 3659 of LNCS., Springer (2005) 427-440
    • (2005) LNCS , vol.3659 , pp. 427-440
    • Good, T.1    Benaissa, M.2
  • 11
    • 35048859848 scopus 로고    scopus 로고
    • Strong authentication for RFID systems using the AES algorithm
    • CHES 2004, Springer
    • Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: CHES 2004. Volume 3156 of LNCS., Springer (2004) 357-370
    • (2004) LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 14
    • 84945300922 scopus 로고    scopus 로고
    • Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
    • ISC 2002, Springer-Verlag
    • Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In: ISC 2002. Volume 2433 of LNCS., Springer-Verlag (2002) 75-89
    • (2002) LNCS , vol.2433 , pp. 75-89
    • Grembowski, T.1    Lien, R.2    Gaj, K.3    Nguyen, N.4    Bellows, P.5    Flidr, J.6    Lehman, T.7    Schott, B.8
  • 15
    • 0013091373 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) FIPS Publication 198
    • National Institute of Standards and Technology (NIST) FIPS Publication 198: The Keyed-Hash Message Authentication Code (HMAC). (2002)
    • (2002) The Keyed-Hash Message Authentication Code (HMAC)
  • 16
    • 80052378761 scopus 로고    scopus 로고
    • Cryptography: Theory and practice
    • 3 edn. Chapman & Hall/CRC
    • Stinson, D.R.: Cryptography: Theory and Practice. 3 edn. Volume 36 of Discrete Mathematics and its Appications. Chapman & Hall/CRC (2005)
    • (2005) Discrete Mathematics and Its Appications , vol.36
    • Stinson, D.R.1
  • 17
    • 0004246335 scopus 로고
    • National Institute of Standards and Technology (NIST) FIPS Publication 81
    • National Institute of Standards and Technology (NIST) FIPS Publication 81: DES modes of operation. (1980)
    • (1980) DES Modes of Operation
  • 18
    • 0003928877 scopus 로고
    • National Institute of Standards and Technology (NIST) FIPS Publication 113
    • National Institute of Standards and Technology (NIST) FIPS Publication 113: Computer Data Authentication. (1985)
    • (1985) Computer Data Authentication
  • 20
    • 4043055208 scopus 로고    scopus 로고
    • Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France
    • Handschuh, H., Naccache, D.: SHACAL. Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France (2000)
    • (2000) SHACAL
    • Handschuh, H.1    Naccache, D.2
  • 21
    • 33646169084 scopus 로고    scopus 로고
    • Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France
    • Handschuh, H., Naccache, D.: SHACAL: a family of block ciphers. Submission to the NESSIE project, Gemplus, F-92447 Issy-les-Moulineaux, France (2001)
    • (2001) SHACAL: A Family of Block Ciphers
    • Handschuh, H.1    Naccache, D.2
  • 22
    • 84937572686 scopus 로고    scopus 로고
    • Analysis of SHA-1 in encryption mode
    • CT-RSA 2001, Springer Verlag
    • Handschuh, H., Knudsen, L.R., Robshaw, M.J.: Analysis of SHA-1 in encryption mode. In: CT-RSA 2001. Volume 2020 of LNCS., Springer Verlag (2001) 70-83
    • (2001) LNCS , vol.2020 , pp. 70-83
    • Handschuh, H.1    Knudsen, L.R.2    Robshaw, M.J.3
  • 23
    • 0242403489 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers based on SHA-1 and MD5
    • FSE 2003
    • Saarinen. M.J.O.: Cryptanalysis of block ciphers based on SHA-1 and MD5. In: FSE 2003. Volume 2887 of LNCS. (2003) 36-44
    • (2003) LNCS , vol.2887 , pp. 36-44
    • Saarinen, M.J.O.1
  • 24
    • 0003629990 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST) FIPS Publication 180-2
    • National Institute of Standards and Technology (NIST) FIPS Publication 180-2: Secure Hash Standard (SHS). (2002)
    • (2002) Secure Hash Standard (SHS)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.