-
2
-
-
77950332642
-
Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller
-
Fan, X., Hu, H., Gong, G., Smith, E.M., Engels, D.: Lightweight Implementation of Hummingbird Cryptographic Algorithm on 4-Bit Microcontroller. In: The 1st International Workshop on RFID Security and Cryptography 2009 (RISC 2009), pp. 838-844 (2009)
-
(2009)
The 1st International Workshop on RFID Security and Cryptography 2009 (RISC 2009)
, pp. 838-844
-
-
Fan, X.1
Hu, H.2
Gong, G.3
Smith, E.M.4
Engels, D.5
-
3
-
-
0242571721
-
Helix: Fast encryption and authentication in a single cryptographic primitive
-
Johansson, T. (ed.) FSE 2003. Springer, Heidelberg
-
Ferguson, N.,Whiting, D., Schneier, B., Kelsey, J., Lucks, S., Kohno, T.: Helix: Fast encryption and authentication in a single cryptographic primitive. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 330-346. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2887
, pp. 330-346
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
4
-
-
77950305865
-
Ultra-Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol
-
Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Ultra-Lightweight Cryptography for Low-Cost RFID Tags: Hummingbird Algorithm and Protocol. Centre for Applied Cryptographic Research (CACR) Technical Reports, CACR-2009-29, http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-29.pdf
-
Centre for Applied Cryptographic Research (CACR) Technical Reports, CACR-2009-29
-
-
Engels, D.1
Fan, X.2
Gong, G.3
Hu, H.4
Smith, E.M.5
-
5
-
-
77956140198
-
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
-
Engels, D., Fan, X., Gong, G., Hu, H., Smith, E.M.: Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. In: 1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC 2010), Tenerife, Canary Islands, Spain (January 2010)
-
1st International Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC 2010), Tenerife, Canary Islands, Spain (January 2010)
-
-
Engels, D.1
Fan, X.2
Gong, G.3
Hu, H.4
Smith, E.M.5
-
6
-
-
78650986137
-
-
Commercial security analysis report by Information Security Systems Inc., April 26
-
Frazer, R. (ed.): An Analysis of the Hummingbird Cryptographic Algorithm. Commercial security analysis report by Information Security Systems Inc., April 26 (2009), http://www.reveresecurity.com/pdfs/ISSI-Hummingbird.pdf
-
(2009)
An Analysis of the Hummingbird Cryptographic Algorithm
-
-
Frazer, R.1
-
7
-
-
79960024111
-
Web page and infomation on the Hummingbird cipher
-
November 03
-
Revere Security. Web page and infomation on the Hummingbird cipher. Fetched November 03 (2010), http://www.reveresecurity.com/
-
(2010)
Fetched
-
-
Security, R.1
-
8
-
-
26444613466
-
Differential Attacks against the Helix Stream Cipher
-
Roy, B.,Meier,W. (eds.) FSE 2004. Springer, Heidelberg
-
Muller, F.: Differential Attacks against the Helix Stream Cipher. In: Roy, B.,Meier,W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 94-108. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3017
, pp. 94-108
-
-
Muller, F.1
-
9
-
-
79959924469
-
-
Personal Communication, July 7
-
Smith, E.M.: Personal Communication, July 7 (2010)
-
(2010)
-
-
Smith, E.M.1
-
10
-
-
33746331948
-
Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive
-
Whiting, D., Schneier, B., Lucks, S., Muller, F.: Phelix - Fast Encryption and Authentication in a Single Cryptographic Primitive. ECRYPT Stream Cipher Project Report 2005/027 (2005), http://www.schneier.com/paper-phelix. html
-
(2005)
ECRYPT Stream Cipher Project Report
, vol.2005
, Issue.27
-
-
Whiting, D.1
Schneier, B.2
Lucks, S.3
Muller, F.4
|