메뉴 건너뛰기




Volumn 4462 LNCS, Issue , 2007, Pages 202-214

Survey and benchmark of stream ciphers for wireless sensor networks

Author keywords

Benchmarks; Sensors; Stream ciphers

Indexed keywords

BENCHMARKING; COMPUTER SOFTWARE; DATA TRANSFER; SECURITY OF DATA; WIRELESS SENSOR NETWORKS; ALGORITHMS; COMPUTATION THEORY; CRYPTOGRAPHY; ENERGY EFFICIENCY; INTELLIGENT BUILDINGS; NETWORK SECURITY; SENSORS; SMART CARDS; SOFTWARE TESTING; UBIQUITOUS COMPUTING;

EID: 37149007406     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72354-7_17     Document Type: Conference Paper
Times cited : (26)

References (38)
  • 4
    • 37149010097 scopus 로고    scopus 로고
    • Eli Biham and Jennifer Seberry. Pypy: Another version of py. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2006. http ://www.ecrypt.eu.org/stream/.
    • Eli Biham and Jennifer Seberry. Pypy: Another version of py. ECRYPT - Network of Excellence in Cryptology, Call for stream Cipher Primitives - Phase 2 2006. http ://www.ecrypt.eu.org/stream/.
  • 6
    • 37149037308 scopus 로고    scopus 로고
    • C. De Cannière. estream optimized code HOWTO. eSTREAM, ECRYPT Stream Cipher Project, 2005. http://www.ecrypt.eu.org/stream/perf/.
    • C. De Cannière. estream optimized code HOWTO. eSTREAM, ECRYPT Stream Cipher Project, 2005. http://www.ecrypt.eu.org/stream/perf/.
  • 7
    • 37149005704 scopus 로고    scopus 로고
    • An observation on dragon. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2007/002
    • Joo Yeon Cho. An observation on dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2007/002, 2007. http://www.ecrypt.eu.org/stream.
    • (2007)
    • Yeon Cho, J.1
  • 8
    • 84937397479 scopus 로고    scopus 로고
    • Cryptanalysis of stream ciphers with linear masking
    • Moti Yung, editor, CRYPTO, of, Springer
    • Don Coppersmith, Shai Halevi, and Charanjit S. Jutla. Cryptanalysis of stream ciphers with linear masking. In Moti Yung, editor, CRYPTO, volume 2442 of Lecture Notes in Computer Science, pages 515-532. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 515-532
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.S.3
  • 9
    • 46449139682 scopus 로고    scopus 로고
    • Improved cryptanalysis of py. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/010
    • Paul Crowley. Improved cryptanalysis of py. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/010, 2006. http://www.ecrypt.eu.org/stream.
    • (2006)
    • Crowley, P.1
  • 12
    • 35248828702 scopus 로고    scopus 로고
    • A new version of the stream cipher SNOW
    • Selected Areas in Cryptography, SAC 2002, of, Springer-Verlag
    • P. Ekdahl and T. Johansson. A new version of the stream cipher SNOW. In Selected Areas in Cryptography - SAC 2002, volume 2295 of Lecture Notes in Computer Science, pages 47-61. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2295 , pp. 47-61
    • Ekdahl, P.1    Johansson, T.2
  • 13
    • 37149052039 scopus 로고    scopus 로고
    • Attack the dragon. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/062
    • Hakan Englund and Alexander Maximov. Attack the dragon. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/062, 2005. http : //www. ecrypt. eu.org/stream.
    • (2005)
    • Englund, H.1    Maximov, A.2
  • 14
    • 37149050496 scopus 로고    scopus 로고
    • FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, 2001. U.S. Department of Commerce/N.I.S.T.
    • FIPS 197. Advanced Encryption Standard. Federal Information Processing Standards Publication 197, 2001. U.S. Department of Commerce/N.I.S.T.
  • 15
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of rc4
    • Selected Areas in Cryptography -SAC 2001, of, Springer-Verlag
    • S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the key scheduling algorithm of rc4. In Selected Areas in Cryptography -SAC 2001, volume 2259 of Lecture Notes in Computer Science, pages 1-24. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 16
    • 37149012236 scopus 로고    scopus 로고
    • Booting and Porting Linux and uClinux on a new platform. Research Report RR2006-08, LIP - ENS Lyon
    • Feb
    • N. Fournel, A. Fraboulet, and P. Feautrier. Booting and Porting Linux and uClinux on a new platform. Research Report RR2006-08, LIP - ENS Lyon, Feb 2006.
    • (2006)
    • Fournel, N.1    Fraboulet, A.2    Feautrier, P.3
  • 17
    • 24944553900 scopus 로고    scopus 로고
    • Guess-and-determine attacks on SNOW
    • Selected Areas in Cryptography -SAC 2002, of, Springer-Verlag
    • P. Hawkes and G. Rose. Guess-and-determine attacks on SNOW. In Selected Areas in Cryptography -SAC 2002, volume 2595 of Lecture Notes in Computer Science, pages 37-46. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2595 , pp. 37-46
    • Hawkes, P.1    Rose, G.2
  • 19
    • 37148999897 scopus 로고    scopus 로고
    • How to break py and pypy by a chosen-iv attack. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/060
    • Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii. How to break py and pypy by a chosen-iv attack. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/060, 2006. http://www.ecrypt.eu.org/stream.
    • (2006)
    • Isobe, T.1    Ohigashi, T.2    Kuwakado, H.3    Morii, M.4
  • 20
    • 37149016266 scopus 로고    scopus 로고
    • Available online, nov
    • Available online, http://kcachegrind.sourceforge.net/, nov 2006.
    • (2006)
  • 21
    • 37149034236 scopus 로고    scopus 로고
    • RSA laboratories. Rsa security response to weaknesses in key scheduling algorithm of rc4. available at http://www.rsasecurity.com/rsalabs/node.asp?id= 2009, 2007.
    • RSA laboratories. Rsa security response to weaknesses in key scheduling algorithm of rc4. available at http://www.rsasecurity.com/rsalabs/node.asp?id= 2009, 2007.
  • 22
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • 65-93
    • Yee Wei Law, Jeroen Doumen, and Pieter Hartel. Survey and benchmark of block ciphers for wireless sensor networks. ACM Trans. Sen. Netw., 2(1):65-93, 2006.
    • (2006) ACM Trans. Sen. Netw , vol.2 , Issue.1
    • Wei Law, Y.1    Doumen, J.2    Hartel, P.3
  • 23
    • 84958972140 scopus 로고    scopus 로고
    • A practical attack on broadcast rc4
    • Fast Software Encryption, FSE 2001, of, Springer-Verlag
    • I. Manti and A. Shamir. A practical attack on broadcast rc4. In Fast Software Encryption - FSE 2001, volume 2335 of Lecture Notes in Computer Science, pages 152-164. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2335 , pp. 152-164
    • Manti, I.1    Shamir, A.2
  • 24
    • 33646812220 scopus 로고    scopus 로고
    • A practical attack on the fixed rc4 in the wep mode
    • Bimal K. Roy, editor, ASIACRYPT, of, Springer
    • Itsik Mantin. A practical attack on the fixed rc4 in the wep mode. In Bimal K. Roy, editor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages 395-411. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 395-411
    • Mantin, I.1
  • 25
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on rc4 keystream generator
    • Ronald Cramer, editor, EUROCRYPT, of, Springer
    • Itsik Mantin. Predicting and distinguishing attacks on rc4 keystream generator. In Ronald Cramer, editor, EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, pages 491-506. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 491-506
    • Mantin, I.1
  • 28
    • 33746753311 scopus 로고    scopus 로고
    • Souradyuti Paul, Bart Preneel, and Gautham Sekar. Distinguishing attacks on the stream cipher py. In Matthew J. B. Robshaw, editor, FSE, 4047 of Lecture Notes in Computer Science, pages 405-421. Springer, 2006.
    • Souradyuti Paul, Bart Preneel, and Gautham Sekar. Distinguishing attacks on the stream cipher py. In Matthew J. B. Robshaw, editor, FSE, volume 4047 of Lecture Notes in Computer Science, pages 405-421. Springer, 2006.
  • 29
    • 37149008575 scopus 로고    scopus 로고
    • Lightweight Implementation of the POSIX Threads API for an On-Chip MIPS Multiprocessor with VCI Interconnect
    • Frédéric Pétrot and Pascal Gomez. Lightweight Implementation of the POSIX Threads API for an On-Chip MIPS Multiprocessor with VCI Interconnect. In DATE 03 Embedded Software Forum, pages 51-56, 2003.
    • (2003) DATE 03 Embedded Software Forum , pp. 51-56
    • Pétrot, F.1    Gomez, P.2
  • 30
    • 31144479254 scopus 로고
    • The RC4 encryption algorithm
    • R. Rivest. The RC4 encryption algorithm. RSA Data Security, 1992.
    • (1992) RSA Data Security
    • Rivest, R.1
  • 31
    • 37149043679 scopus 로고    scopus 로고
    • Available online, nov, http://www.skyeye.org
    • Available online, http://www.skyeye.Org/http://www.skyeye.org/, nov 2006.
    • (2006)
  • 32
    • 33746729581 scopus 로고    scopus 로고
    • A distinguishing attack of SNOW 2.0 with linear masking method
    • Selected Areas in Cryptography 2003, of, Springer-Verlag
    • D. Watanabe, A. Biryukov, and C. De Cannire. A distinguishing attack of SNOW 2.0 with linear masking method. In Selected Areas in Cryptography 2003, volume 3006 of Lecture Notes in Computer Science, pages 222-233. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.3006 , pp. 222-233
    • Watanabe, D.1    Biryukov, A.2    De Cannire, C.3
  • 36
    • 62349094225 scopus 로고    scopus 로고
    • Attacking the iv setup of stream cipher lex. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2005/059
    • Hongjun Wu and Bart Preneel. Attacking the iv setup of stream cipher lex. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/059, 2005. http://www. ecrypt.eu.org/stream.
    • (2005)
    • Wu, H.1    Preneel, B.2
  • 37
    • 37149015310 scopus 로고    scopus 로고
    • Differential-linear attacks against the stream cipher phelix. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/056
    • Hongjun Wu and Bart Preneel. Differential-linear attacks against the stream cipher phelix. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/056, 2006. http ://www.ecrypt.eu.org/stream.
    • (2006)
    • Wu, H.1    Preneel, B.2
  • 38
    • 37149027724 scopus 로고    scopus 로고
    • Key recovery attack on py and pypy with chosen ivs. eSTREAM
    • ECRYPT Stream Cipher Project, Report 2006/052
    • Hongjun Wu and Bart Preneel. Key recovery attack on py and pypy with chosen ivs. eSTREAM, ECRYPT Stream Cipher Project, Report 2006/052, 2006. http ://www.ecrypt.eu.org/stream.
    • (2006)
    • Wu, H.1    Preneel, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.