-
1
-
-
33744940544
-
Efficient RFID authentication protocol for ubiquitous computing environment
-
Embedded and Ubiquitous Computing - EUC 2005 Workshops, . Springer, December
-
E. Y. Choi, S.-M. Lee, and D. H. Lee. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. In Embedded and Ubiquitous Computing - EUC 2005 Workshops, volume 3823 of LNCS, pages 945-954. Springer, December 2005.
-
(2005)
LNCS
, vol.3823
, pp. 945-954
-
-
Choi, E.Y.1
Lee, S.-M.2
Lee, D.H.3
-
2
-
-
3042615299
-
The design of a high speed ASIC unit for the hash function SHA-256 (384, 512)
-
IEEE Computer Society
-
L. Dadda, M. Macchetti, and J. Owen. The Design of a High Speed ASIC Unit for the Hash Function SHA-256 (384, 512). In 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), volume 3, pages 70-75. IEEE Computer Society, 2004.
-
(2004)
2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004)
, vol.3
, pp. 70-75
-
-
Dadda, L.1
Macchetti, M.2
Owen, J.3
-
4
-
-
77956436878
-
A hardware implementation of MD4-family hash algorithms
-
IEEE Computer Society, October
-
S. Dominkus. A hardware implementation of MD4-family hash algorithms. In 9th IEEE International Conference on Electronics, Circuits and Systems, volume 3, pages 1143-1146. IEEE Computer Society, October 2002.
-
(2002)
9th IEEE International Conference on Electronics, Circuits and Systems
, vol.3
, pp. 1143-1146
-
-
Dominkus, S.1
-
5
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
Cryptographic Hardware and Embedded Systems - CHES 2004, . Springer, August
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong Authentication for RFID Systems using the AES Algorithm. In Cryptographic Hardware and Embedded Systems - CHES 2004, volume 3156 of LNCS, pages 357-370. Springer, August 2004.
-
(2004)
LNCS
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
6
-
-
33746739905
-
AES implementation on a grain of sand
-
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen. AES Implementation on a Grain of Sand. IEE Proceedings on Information Security, 152(1):13-20, 2005.
-
(2005)
IEE Proceedings on Information Security
, vol.152
, Issue.1
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
10
-
-
3042644992
-
-
November
-
National Institute of Standards and Technology (NIST). FIPS-197: Advanced Encryption Standard, November 2001. Available online at http://www.itl.nist. gov/fipspubs/.
-
(2001)
FIPS-197: Advanced Encryption Standard
-
-
-
11
-
-
4043135942
-
-
August
-
National Institute of Standards and Technology (NIST). FIPS-180-2: Secure Hash Standard, August 2002. Available online at http://www.itl.nist.gov/ fipspubs/.
-
(2002)
FIPS-180-2: Secure Hash Standard
-
-
-
12
-
-
33845408702
-
A universal and efficient SHA-256 implementation for FP-GAs
-
ISBN 3-200-00211-5
-
N. Pramstaller and M. Aigner. A Universal and Efficient SHA-256 Implementation for FP-GAs. In Austrochip 2004, pages 89-93, 2004. ISBN 3-200-00211-5.
-
(2004)
Austrochip 2004
, pp. 89-93
-
-
Pramstaller, N.1
Aigner, M.2
-
13
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment
-
Security in Pervasive Computing, Second International Conference, SPC 2005, . Springer
-
K. Rhee, J. Kwak, S. Kim, and D. Won. Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. In Security in Pervasive Computing, Second International Conference, SPC 2005, volume 3450 of LNCS, pages 70-84. Springer, 2005.
-
(2005)
LNCS
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
14
-
-
24744461146
-
ASIC-hardware-focused comparison for hash functions MD5, RIPEMD-160, and SHS
-
. IEEE Computer Society
-
A. Satoh and T. Inoue. ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. In International Symposium on Information Technology: Coding and Computing (ITCC 2005), volume 1, pages 532-537. IEEE Computer Society, 2005.
-
(2005)
International Symposium on Information Technology: Coding and Computing (ITCC 2005)
, vol.1
, pp. 532-537
-
-
Satoh, A.1
Inoue, T.2
-
15
-
-
15544371957
-
Implementation of the SHA-2 hash family standard using FPGAs
-
March
-
N. Sklavos and O. Koufopavlou. Implementation of the SHA-2 Hash Family Standard Using FPGAs. The Journal of Supercomputing, 31(3):227-248, March 2005.
-
(2005)
The Journal of Supercomputing
, vol.31
, Issue.3
, pp. 227-248
-
-
Sklavos, N.1
Koufopavlou, O.2
-
16
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
1st Annual Conference on Security in Pervasive Computing
-
S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In 1st Annual Conference on Security in Pervasive Computing, volume 2802 of LNCS, pages 201-212, 2003.
-
(2003)
LNCS
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
|