메뉴 건너뛰기




Volumn 1, Issue 3-4, 2006, Pages 138-146

A lightweight encryption and authentication scheme for wireless sensor networks

Author keywords

Derivable Public Key (DPK); security; Wireless Sensor Networks (WSNs)

Indexed keywords


EID: 79955980141     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.011773     Document Type: Article
Times cited : (37)

References (17)
  • 3
    • 0000239931 scopus 로고    scopus 로고
    • The block cipher Rijndael
    • J.J. Quisquater and B. Schneier (Eds) Springer-Verlag
    • Rijmen, V. and Daemen, J. (2000) ‘The block cipher Rijndael’, in J.J. Quisquater and B. Schneier (Eds). Smart Card Research and Applications, LNCS 1820, pp.288–296, Springer-Verlag.
    • (2000) Smart Card Research and Applications, LNCS 1820 , pp. 288-296
    • Rijmen, V.1    Daemen, J.2
  • 4
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • Bellare, M., Kilian, J. and Rogaway, P. (2000) ‘The security of the cipher block chaining message authentication code’, Journal of Computer and System Sciences, Vol. 61, No. 3, pp.362–399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A. and Adleman, L.M. (1978) ‘A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol. 21, No. 2, pp.120–126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 9
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • ElGamal, T. (1985) ‘A public key cryptosystem and a signature scheme based on discrete logarithms’, IEEE Transactions on Information Theory, Vol. 31, pp.469–472.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 13
    • 0000653210 scopus 로고    scopus 로고
    • Selecting cryptographic key sizes
    • Lenstra, A. and Verheul, E. (2001) ‘Selecting cryptographic key sizes’, Journal of Cryptology, Vol. 14, No. 4, pp.255–293.
    • (2001) Journal of Cryptology , vol.14 , Issue.4 , pp. 255-293
    • Lenstra, A.1    Verheul, E.2
  • 16
    • 84952958410 scopus 로고    scopus 로고
    • Here MAC is short for Message Authentication Code, not for Medium Access Control
    • Here MAC is short for Message Authentication Code, not for Medium Access Control.
  • 17
    • 85086953882 scopus 로고    scopus 로고
    • p, and (mod p) is assumed whenever necessary
    • p, and (mod p) is assumed whenever necessary.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.