메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A lightweight stream cipher WG-7 for RFID encryption and authentication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ECONOMIC AND SOCIAL EFFECTS; MICROCONTROLLERS; RADIO FREQUENCY IDENTIFICATION (RFID);

EID: 79551648752     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2010.5684215     Document Type: Conference Paper
Times cited : (51)

References (25)
  • 1
    • 84937419430 scopus 로고    scopus 로고
    • Cryptanalytic time/memory/data tradeoffs for stream ciphers
    • Advances in Cryptology-Asiacrypt'00, Springer-Verlag
    • A. Biryukov and A. Shamir, Cryptanalytic time/memory/data tradeoffs for stream ciphers, Advances in Cryptology-Asiacrypt'00, Lecture Notes in Computer Science, vol. 1976. Springer-Verlag, 2000, pp. 1-13.
    • (2000) Lecture Notes in Computer Science , vol.1976 , pp. 1-13
    • Biryukov, A.1    Shamir, A.2
  • 2
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Fast Software Encryption' 00, Springer-Verlag
    • V. Chepyzhov, T. Johansson and B. Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption' 00, Lecture Notes in Computer Science, vol. 1978, Springer-Verlag, 2001, pp. 181-195.
    • (2001) Lecture Notes in Computer Science , vol.1978 , pp. 181-195
    • Chepyzhov, V.1    Johansson, T.2    Smeets, B.3
  • 3
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • Advances in Cryptology-Crypto'03, Springer-Verlag
    • N. Courtois, Fast algebraic attacks on stream ciphers with linear feedback, Advances in Cryptology-Crypto'03, Lecture Notes in Computer Science, vol. 2729, pp. 176-194, Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 176-194
    • Courtois, N.1
  • 4
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with lienar feedback
    • Advances in Cryptology-Eurocrypt'03, Springer
    • N. Courtois and W. Meier, Algebraic attacks on stream ciphers with lienar feedback, Advances in Cryptology-Eurocrypt'03, Lecture Notes in Computer Science, vol. 2656, pp. 345-359, Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 5
    • 67650699727 scopus 로고    scopus 로고
    • Cube attacks on tweakable black box polynomials
    • Advances in Cryptology-Eurocrypt'09. Springer
    • I. Dinur, A. Shamir, Cube attacks on tweakable black box polynomials. Advances in Cryptology-Eurocrypt'09. Lecture Notes in Computer Science, vol. 5479, pp. 278C299. Springer, 2009.
    • (2009) Lecture Notes in Computer Science , vol.5479
    • Dinur, I.1    Shamir, A.2
  • 9
    • 85164900472 scopus 로고    scopus 로고
    • Fast Linear Subspace Attacks on Stream Ciphers
    • Avaiable at
    • G. Gong, S. Ronjom, T. Helleseth and H. Hu. Fast Linear Subspace Attacks on Stream Ciphers, CACR Technical Report. Avaiable at http://www.cacr.math. uwaterloo.ca/techreports/2009/cacr2009-04.pdf.
    • CACR Technical Report
    • Gong, G.1    Ronjom, S.2    Helleseth, T.3    Hu, H.4
  • 10
    • 0036845302 scopus 로고    scopus 로고
    • Cryptographic properties of the Welch-Gong transformation sequence generators
    • G. Gong and A. Youssef, Cryptographic properties of the Welch-Gong transformation sequence generators, IEEE Transactions on Information Theory, vol. 48, no. 11, pp. 2837-2846, 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.11 , pp. 2837-2846
    • Gong, G.1    Youssef, A.2
  • 11
    • 27244443921 scopus 로고    scopus 로고
    • AES on FPGA from the Fastest to the Smallest
    • T. Good and M. Benaissa , AES on FPGA from the Fastest to the Smallest, Lecture Notes in Computer Science, vol. 3659, pp. 427-440, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 427-440
    • Good, T.1    Benaissa, M.2
  • 12
    • 35048899747 scopus 로고    scopus 로고
    • Related key differential attacks on 27 rounds of XTEA and full-round GOST
    • Fast Software Encryption'04, Springer-Verlag
    • Y. Ko, S. Hong, W. Lee, S. Lee and J.S. Kang, Related key differential attacks on 27 rounds of XTEA and full-round GOST, Fast Software Encryption'04, Lecture Notes in Computer Science, vol 3017, Springer-Verlag, 2004, pp. 299-316.
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 299-316
    • Ko, Y.1    Hong, S.2    Lee, W.3    Lee, S.4    Kang, J.S.5
  • 14
    • 35048845264 scopus 로고    scopus 로고
    • Algebraic attacks and decomposition of boolean functions
    • Advances in Cryptology-Eurocrypt'04, Springer
    • W. Meier, E. Pasalic and C. Carlet, Algebraic attacks and decomposition of boolean functions, In Advances in Cryptology-Eurocrypt'04, Lecture Notes in Computer Science, vol. 3027, pp. 474-491, Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3027 , pp. 474-491
    • Meier, W.1    Pasalic, E.2    Carlet, C.3
  • 15
    • 38549124306 scopus 로고    scopus 로고
    • Two trivial attacks on trivium
    • Selected Areas in Cryptography, Springer-Verlag
    • A. Maximov and A. Biryukov, Two trivial attacks on trivium, Selected Areas in Cryptography, Lecture Notes in Computer Science, vol 4876, Springer-Verlag, 2007, pp. 36-55.
    • (2007) Lecture Notes in Computer Science , vol.4876 , pp. 36-55
    • Maximov, A.1    Biryukov, A.2
  • 18
    • 38649135720 scopus 로고    scopus 로고
    • WG: A family of stream ciphers with designed randomness properties
    • Y. Nawaz and G. Gong, WG: A family of stream ciphers with designed randomness properties, Information Science, vol. 178, no. 7, pp. 1903-1916, 2008.
    • (2008) Information Science , vol.178 , Issue.7 , pp. 1903-1916
    • Nawaz, Y.1    Gong, G.2
  • 19
    • 78049345090 scopus 로고    scopus 로고
    • D. Otte, AVR-Crypto-Lib, http://www.das-labor.org/wiki/AVR-Crypto-Lib/en, 2009.
    • (2009) AVR-Crypto-Lib
    • Otte, D.1
  • 21
    • 38149000895 scopus 로고    scopus 로고
    • m)
    • Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, June 2007
    • m), Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, June 2007, Lecture Notes on Computer Science, vol. 4547, pp. 264-275, 2007.
    • (2007) Lecture Notes on Computer Science , vol.4547 , pp. 264-275
    • Ronjom, S.1    Helleseth, T.2
  • 22
    • 38549115772 scopus 로고    scopus 로고
    • On attacks on filtering generators using linear subspace structures
    • Sequences, Subsequences and Consequences, S.W. Golomb et al. (Eds.)
    • S. Ronjom, G. Gong and T. Helleseth, On attacks on filtering generators using linear subspace structures, Sequences, Subsequences and Consequences, Lecture Notes in Computer Science, S.W. Golomb et al. (Eds.), vol. 4893, pp. 204-217, 2007.
    • (2007) Lecture Notes in Computer Science , vol.4893 , pp. 204-217
    • Ronjom, S.1    Gong, G.2    Helleseth, T.3
  • 23
    • 0021489155 scopus 로고
    • Correlation-immunity of nonlinear combining functions for cryptographic applications
    • T. Siegenthaler, Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Transactions on Information Theory, vol. 30, no. 5, pp. 776-780, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 , Issue.5 , pp. 776-780
    • Siegenthaler, T.1
  • 24
    • 85164886079 scopus 로고    scopus 로고
    • Hardware/software codesign for stream ciphers
    • submitted to
    • P. Schaumont and I. Verbauwhede., Hardware/software codesign for stream ciphers, submitted to ESTREAM Project, 2007.
    • (2007) ESTREAM Project
    • Schaumont, P.1    Verbauwhede, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.