메뉴 건너뛰기




Volumn , Issue , 2008, Pages 795-800

Tiny dragon - an encryption algorithm for wireless sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; HIGH PERFORMANCE LIQUID CHROMATOGRAPHY; HYBRID SENSORS; PUBLIC KEY CRYPTOGRAPHY; ROUTING PROTOCOLS; SENSOR NETWORKS; SENSORS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 56349148485     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HPCC.2008.51     Document Type: Conference Paper
Times cited : (5)

References (7)
  • 1
    • 58349103446 scopus 로고    scopus 로고
    • An improved estimate of the correlation of distinguisher for Dragon
    • J. Y. Cho. An improved estimate of the correlation of distinguisher for Dragon. In State of the Art of Stream Ciphers 2008, 2008.
    • (2008) State of the Art of Stream Ciphers , pp. 2008
    • Cho, J.Y.1
  • 2
    • 38149010854 scopus 로고    scopus 로고
    • August, Available at
    • J. Daemen and V. Rijmen. Rijndael. August 1998. Available at http://csrc.nist.gov/encryption/aes/.
    • (1998) Rijndael
    • Daemen, J.1    Rijmen, V.2
  • 3
    • 56349118530 scopus 로고    scopus 로고
    • E. Dawson, M. Henricksen, and L. Simpson. New Stream Cipher Designs: The eSTREAM Finalists, 4986 of Lecture Notes in Computer Science, chapter The Dragon Stream Cipher: Design, Analysis and Implementation Issues. Springer, 2008.
    • E. Dawson, M. Henricksen, and L. Simpson. New Stream Cipher Designs: The eSTREAM Finalists, volume Vol. 4986 of Lecture Notes in Computer Science, chapter The Dragon Stream Cipher: Design, Analysis and Implementation Issues. Springer, 2008.
  • 5
    • 0242487632 scopus 로고    scopus 로고
    • Linear redundancy in s-boxes
    • J. Daemen and V. Rijmen, editors, Proceedings of the 9th International Workshop on Fast Software Encryption, of, Springer-Verlag
    • J. Fuller and W. Millan. Linear redundancy in s-boxes. In J. Daemen and V. Rijmen, editors, Proceedings of the 9th International Workshop on Fast Software Encryption, volume 2365 of Lecture Notes in Computer Science, pages 74-86. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2365 , pp. 74-86
    • Fuller, J.1    Millan, W.2
  • 6
    • 70350671935 scopus 로고    scopus 로고
    • Dragon-MAC: Securing wireless sensor networks with authenticated encryption. Cryptology ePrint Archive
    • Report 2007/204, Available at
    • S. Y. Lim, C. C. Pu, H. T. Lim, and H. J. Lee. Dragon-MAC: Securing wireless sensor networks with authenticated encryption. Cryptology ePrint Archive, Report 2007/204, 2007. Available at http://eprint.iacr.org/2007/204. pdf.
    • (2007)
    • Lim, S.Y.1    Pu, C.C.2    Lim, H.T.3    Lee, H.J.4
  • 7
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for DES cipher
    • T. Helleseth, editor, Advances in Cryptology -Proceedings of EUROCRYPT 93, of, Springer-Verlag
    • M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology -Proceedings of EUROCRYPT 93, volume 765 of Lecture Notes in Computer Science, pages 386-397. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.