-
1
-
-
84888671264
-
Cryptanalysis of grain. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2006/019
-
Côme Berbain, Henri Gilbert, and Alexander Maximov. Cryptanalysis of grain. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/019, 2006. http://www.ecrypt.eu.org/stream.
-
(2006)
-
-
Berbain, C.1
Gilbert, H.2
Maximov, A.3
-
2
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
P. McDaniel, editor, USENIX
-
Stephen C. Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, and Michael Szydlo. Security analysis of a cryptographically-enabled RFID device. In P. McDaniel, editor, 14th USENIX Security Symposium, pages 1-16. USENIX, 2005.
-
(2005)
14th USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
3
-
-
33845920117
-
++: A lightweight authentication protocol secure against some attacks
-
Lyon, France, June, IEEE Computer Society Press
-
++: a lightweight authentication protocol secure against some attacks. In IEEE - SecPerU 2006, Lyon, France, June 2006. IEEE Computer Society Press.
-
(2006)
IEEE - SecPerU 2006
-
-
Bringer, J.1
Chabanne, H.2
Dottax, E.3
-
4
-
-
27644472569
-
+ - a provably secure lightweight authentication protocol
-
October
-
+ - a provably secure lightweight authentication protocol. IEEE Electronics Letters, 41(21):1169-1170, October 2005.
-
(2005)
IEEE Electronics Letters
, vol.41
, Issue.21
, pp. 1169-1170
-
-
Gilbert, H.1
Robshaw, M.2
Sibert, H.3
-
5
-
-
34547693749
-
Grain - a stream cipher for constrained environments. eSTREAM
-
ECRYPT Stream Cipher Project, Report 2005/010
-
Martin Hell, Thomas Johansson, and Willi Meier. Grain - a stream cipher for constrained environments. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/010, 2005. http://www.ecrypt.eu.org/stream.
-
(2005)
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
6
-
-
33745181952
-
Authenticating pervasive devices with human protocols
-
Advances in Cryptology, CRYPTO 2005, Springer-Verlag
-
Ari Juels and Stephen A. Weis. Authenticating pervasive devices with human protocols. In Advances in Cryptology - CRYPTO 2005, pages 293-308. Springer-Verlag, 2005. Lecture Notes in Computer Science, Volume 3621.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 293-308
-
-
Juels, A.1
Weis, S.A.2
-
7
-
-
33746104831
-
+ protocols
-
Advances in Cryptology, EURO-CRYPT 2006, of, Springer
-
+ protocols. In Advances in Cryptology - EURO-CRYPT 2006, volume 4004 of Lecture Notes in Computer Science, pages 73-87. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 73-87
-
-
Katz, J.1
Sun Shin, J.2
-
8
-
-
34247336490
-
Cryptanalysis of the "grain" family of stream ciphers
-
New York, NY, USA, ACM Press
-
Alexander Maximov. Cryptanalysis of the "grain" family of stream ciphers. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 283-288, New York, NY, USA, 2006. ACM Press.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 283-288
-
-
Maximov, A.1
-
10
-
-
33144480778
-
Security parallels between people and pervasive devices
-
Washington, DC, USA, IEEE Computer Society
-
Stephen A. Weis. Security parallels between people and pervasive devices. In PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, pages 105-109, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
PERCOMW '05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 105-109
-
-
Weis, S.A.1
|