메뉴 건너뛰기




Volumn , Issue , 2009, Pages 371-378

Comparing block cipher modes of operation on MICAz sensor nodes

Author keywords

[No Author keywords available]

Indexed keywords

AVAILABLE ENERGY; BEST CHOICE; BLOCK CIPHER MODES; COMPUTING POWER; HOSTILE ENVIRONMENTS; KEY TECHNOLOGIES; MESSAGE AUTHENTICATION; MICAZ SENSOR NODE; NETWORK TRAFFIC; OFFSET CODEBOOK; PACKET SIZE; SECURITY SOLUTIONS; TRADITIONAL COMPUTING SYSTEMS;

EID: 70349099225     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PDP.2009.16     Document Type: Conference Paper
Times cited : (7)

References (14)
  • 1
    • 0003278940 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • Springer, December
    • M. Bellare and C. Namprempre, "Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm," in Proceedings of ASIACRYPT 2000, Springer, December 2000, pp. 531-545.
    • (2000) Proceedings of ASIACRYPT 2000 , pp. 531-545
    • Bellare, M.1    Namprempre, C.2
  • 2
    • 0037673324 scopus 로고    scopus 로고
    • Authenticated-encryption with associated-data
    • ACM Press, November
    • P. Rogaway, "Authenticated-encryption with associated-data," in Proceedings of CCS 2002, ACM Press, November 2002, pp. 98-107.
    • (2002) Proceedings of CCS 2002 , pp. 98-107
    • Rogaway, P.1
  • 5
    • 26444468160 scopus 로고    scopus 로고
    • Two-pass authenticated encryption faster than generic composition
    • Springer, February
    • S. Lucks, "Two-Pass Authenticated Encryption Faster Than Generic Composition," in Proceedings of FSE 2005, Springer, February 2005, pp. 284-298.
    • (2005) Proceedings of FSE 2005 , pp. 284-298
    • Lucks, S.1
  • 6
    • 33746355884 scopus 로고    scopus 로고
    • Available online at revised Submission to NIST Modes of Operation Process
    • D. A. McGrew and J. Viega, "The Galois/Counter Mode of Operation (GCM)," Available online at http://csrc.nist.gov/groups/ST/toolkit/BCM/ documents/proposedmodes/gcm/gcm-revised-spec.pdf, May 2005, revised Submission to NIST Modes of Operation Process.
    • (2005) The Galois/Counter Mode of Operation (GCM)
    • McGrew, D.A.1    Viega, J.2
  • 7
    • 70349281772 scopus 로고    scopus 로고
    • Crossbow Technology Inc Available online at
    • Crossbow Technology, Inc., "MICAz Wireless Measurement System," Available online at http://www.xbow.com/Products/ Product-pdf-files/Wkeless- pdf/MlCAz-Datasheet.pdf.
    • MICAz Wireless Measurement System
  • 8
    • 84891797725 scopus 로고    scopus 로고
    • TinyOS Community, "The TinyOS Website," http://www. tinyos.net.
    • The TinyOS Website
  • 9
    • 33845925071 scopus 로고    scopus 로고
    • A general construction of tweakable block ciphers and different modes of operations
    • Springer
    • D. Chakraborty and P. Sarkar, "A General Construction of Tweakable Block Ciphers and Different Modes of Operations," in Information Security and Cryptology, Springer, 2006, pp. 88-102.
    • (2006) Information Security and Cryptology , pp. 88-102
    • Chakraborty, D.1    Sarkar, P.2
  • 11
    • 0035750947 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • ACM Press
    • P. Rogaway, M. Bellare, J. Black, and T. Krovetz, "OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption," in Proceedings of CCS 2001), ACM Press, 2001, pp. 196-205.
    • (2001) Proceedings of CCS 2001 , pp. 196-205
    • Rogaway, P.1    Bellare, M.2    Black, J.3    Krovetz, T.4
  • 13
    • 35048856034 scopus 로고    scopus 로고
    • CWC: A high- performance conventional authenticated encryption mode
    • Springer, February
    • T. Kohno, J. Viega, and D. Whiting, "CWC: A high- performance conventional authenticated encryption mode," in Proceedings of FSE 2004, Springer, February 2004, pp. 408-426.
    • (2004) Proceedings of FSE 2004 , pp. 408-426
    • Kohno, T.1    Viega, J.2    Whiting, D.3
  • 14
    • 26444574670 scopus 로고    scopus 로고
    • TinySec: A link layer security architecture for wireless sensor networks
    • ACM Press, November
    • C. Karlof, N. Sastry, and D. Wagner, "TinySec: A Link Layer Security Architecture for Wireless Sensor Networks," in Proceedings of SenSys 2004. ACM Press, November 2004, pp. 162-175.
    • (2004) Proceedings of SenSys 2004 , pp. 162-175
    • Karlof, C.1    Sastry, N.2    Wagner, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.