메뉴 건너뛰기




Volumn , Issue , 2006, Pages 682-686

Low power implementation of SHA-1 algorithm for RFID system

Author keywords

Hash function; Low power; RFID system; SHA 1

Indexed keywords

CMOS INTEGRATED CIRCUITS; COMPUTER HARDWARE; DATA TRANSFER; ELECTRIC POWER UTILIZATION; FORMAL LOGIC;

EID: 34547312233     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (5)

References (8)
  • 1
    • 34547345410 scopus 로고    scopus 로고
    • FIPS 180-1, Secure Hash standard, NIST, US Department of Commerce, Washington D. C., April 1995
    • FIPS 180-1, Secure Hash standard, NIST, US Department of Commerce, Washington D. C., April 1995
  • 2
    • 35048859848 scopus 로고    scopus 로고
    • Strong Authentication for RFID Systems Using the AES Algorithm CHES 2004
    • M. Feldhofer, S. Dominikus and J. Wolkerstorfer "Strong Authentication for RFID Systems Using the AES Algorithm" CHES 2004, LNCS 3156, pp. 357-370.
    • LNCS , vol.3156 , pp. 357-370
    • Feldhofer, M.1    Dominikus, S.2    Wolkerstorfer, J.3
  • 4
    • 38149077315 scopus 로고    scopus 로고
    • FPGA Implementation of SHA-1 Algorithm
    • D. Zibin and Z. Ning. "FPGA Implementation of SHA-1 Algorithm" ASIC 2003. 1321-1324.
    • (2003) ASIC , pp. 1321-1324
    • Zibin, D.1    Ning, Z.2
  • 5
    • 21644474998 scopus 로고    scopus 로고
    • An Efficient ASIC implementation, of SHA-1 Engine for TPM
    • Y. Ming-yan, Z. Tong, W. Jin-xiang and Y. Yi-zheng. "An Efficient ASIC implementation, of SHA-1 Engine for TPM" APCCS 2004. 873-876.
    • (2004) APCCS , pp. 873-876
    • Ming-yan, Y.1    Tong, Z.2    Jin-xiang, W.3    Yi-zheng, Y.4
  • 6
    • 33646401086 scopus 로고    scopus 로고
    • Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study PATMOS 2005
    • PP
    • H.E. Michail, A. P. Kakarountas, G. N. Selimis, C. E. Goutis. "Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study" PATMOS 2005, LNCS 3728, PP. 591-600
    • LNCS , vol.3728 , pp. 591-600
    • Michail, H.E.1    Kakarountas, A.P.2    Selimis, G.N.3    Goutis, C.E.4
  • 7
    • 33748341920 scopus 로고    scopus 로고
    • Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware
    • A.L Huang and W.T. Penzhorn. "Cryptographic Hash Functions and Low-Power Techniques for Embedded Hardware" IEEE ISIE 2005, pp. 1789-1794.
    • (2005) IEEE ISIE , pp. 1789-1794
    • Huang, A.L.1    Penzhorn, W.T.2
  • 8
    • 35048876270 scopus 로고    scopus 로고
    • Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems Security and Pervasive Computing 2003
    • S. Weis et al., "Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems" Security and Pervasive Computing 2003, LNCS 2802, pp. 201-212.
    • LNCS , vol.2802 , pp. 201-212
    • Weis, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.