메뉴 건너뛰기




Volumn 29, Issue 1, 2014, Pages 53-68

TuLP: A family of lightweight message authentication codes for body sensor networks

Author keywords

body sensor network; low resource implementation; message authentication code

Indexed keywords

BODY SENSOR NETWORKS (BSN); INTERNAL COLLISION; LOW-RESOURCE IMPLEMENTATION; MESSAGE AUTHENTICATION CODES; PERSONAL HEALTH INFORMATIONS; PUBLIC INFORMATION; RESOURCE-EFFICIENT; SECURITY ARCHITECTURE;

EID: 84893333767     PISSN: 10009000     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11390-013-1411-8     Document Type: Article
Times cited : (19)

References (42)
  • 10
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for e ± cient authenticated encryption
    • 10.1145/937527.937529
    • Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for e ± cient authenticated encryption. ACM Transactions on Information and System Security, 2003, 6(3): 365-403.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 11
    • 0013091373 scopus 로고    scopus 로고
    • Information Technology Laboratory, National Institute of Standards and Technology of U.S. Federal Information Processing Standards Publication, FIPS PUB 198 Oct. 2013
    • Information Technology Laboratory, National Institute of Standards and Technology of U.S. The keyed-hash message authentication code (HMAC). Federal Information Processing Standards Publication, FIPS PUB 198. http://csrc.nist. gov/publications/ps/ps198/ps-198a.pdf, Oct. 2013.
    • The Keyed-hash Message Authentication Code (HMAC)
  • 13
    • 26444575926 scopus 로고    scopus 로고
    • A new MAC construction ALRED and a specīc instance ALPHA-MAC
    • Gilbert H, Handschuh H (eds.), Springer-Verlag
    • Daemen J, Rijmen V. A new MAC construction ALRED and a specīc instance ALPHA-MAC. In Lecture Notes in Computer Science 3557, Gilbert H, Handschuh H (eds.), Springer-Verlag, 2005, pp.1-17.
    • (2005) Lecture Notes in Computer Science 3557 , pp. 1-17
    • Daemen, J.1    Rijmen, V.2
  • 14
    • 37149045263 scopus 로고    scopus 로고
    • PRESENT: An ultra-lightweight block cipher
    • Paillier P, Verbauwhede I (eds.), Springer Heidelberg
    • Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: An ultra-lightweight block cipher. In Lecture Notes in Computer Science 4727, Paillier P, Verbauwhede I (eds.), Springer Heidelberg, 2007, pp.450-466.
    • (2007) Lecture Notes in Computer Science 4727 , pp. 450-466
    • Bogdanov, A.1    Knudsen, L.R.2    Leander, G.3
  • 15
  • 19
    • 77649256427 scopus 로고    scopus 로고
    • Towards secure and practical MACs for body sensor networks
    • Roy B K, Sendrier N (eds.), Springer-Verlag
    • Gong Z, Hartel P, Nikova S, Zhu B. Towards secure and practical MACs for body sensor networks. In Lecture Notes in Computer Science 5922, Roy B K, Sendrier N (eds.), Springer-Verlag, 2009, pp.182-198.
    • (2009) Lecture Notes in Computer Science 5922 , pp. 182-198
    • Gong, Z.1    Hartel, P.2    Nikova, S.3    Zhu, B.4
  • 22
    • 45449086242 scopus 로고    scopus 로고
    • Differential cryptanalysis of reduced-round PRESENT
    • Vaudenay S (ed.), Springer-Verlag
    • Wang M. Differential cryptanalysis of reduced-round PRESENT. In Lecture Notes in Computer Science 5023, Vaudenay S (ed.), Springer-Verlag, 2008, pp.40-49.
    • (2008) Lecture Notes in Computer Science 5023 , pp. 40-49
    • Wang, M.1
  • 23
    • 70350378884 scopus 로고    scopus 로고
    • Algebraic techniques in di®erential crypt-analysis
    • Dunkelman O (ed.), Springer-Verlag
    • Albrecht M, Cid C. Algebraic techniques in di®erential crypt-analysis. In Lecture Notes in Computer Science 5665, Dunkelman O (ed.), Springer-Verlag, 2009, pp.193-208.
    • (2009) Lecture Notes in Computer Science 5665 , pp. 193-208
    • Albrecht, M.1    Cid, C.2
  • 24
    • 67650119051 scopus 로고    scopus 로고
    • A statistical saturation attack against the block cipher PRESENT
    • Fischlin M (ed.), Springer-Verlag
    • Collard B, Standaert F X. A statistical saturation attack against the block cipher PRESENT. In Lecture Notes in Computer Science 5473, Fischlin M (ed.), Springer-Verlag, 2009, pp.195-210.
    • (2009) Lecture Notes in Computer Science 5473 , pp. 195-210
    • Collard, B.1    Standaert, F.X.2
  • 25
    • 70350681087 scopus 로고    scopus 로고
    • Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT
    • Boyd C, Nieto J G (eds.), Springer-Verlag
    • Ozen O, Varici K, Tezcan C, Kocair C. Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In Lecture Notes in Computer Science 5594, Boyd C, Nieto J G (eds.), Springer-Verlag, 2009, pp.90-107.
    • (2009) Lecture Notes in Computer Science 5594 , pp. 90-107
    • Ozen, O.1    Varici, K.2    Tezcan, C.3    Kocair, C.4
  • 28
  • 29
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • 10.1006/jcss.1999.1694 0970.68054 1800307
    • Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 2000, 61(3): 362-399.
    • (2000) Journal of Computer and System Sciences , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 30
    • 17444383008 scopus 로고    scopus 로고
    • CBC MACs for arbitrary-length messages: The three-key constructions
    • 10.1007/s00145-004-0016-3 1084.68045 2148054
    • Black J, Rogaway P. CBC MACs for arbitrary-length messages: The three-key constructions. Journal of Cryptology, 2005, 18(2): 111-131.
    • (2005) Journal of Cryptology , vol.18 , Issue.2 , pp. 111-131
    • Black, J.1    Rogaway, P.2
  • 33
  • 34
    • 84893242674 scopus 로고    scopus 로고
    • Performance of optimized implementations of the NESSIE primitives (v2.0 edition)
    • August
    • Preneel B, van Rompay B, Ä Ors S B, et al. Performance of optimized implementations of the NESSIE primitives (v2.0 edition). In The NESSIE Consortium, http://www.cosic.esat.kuleuven.be/nessie/deliverables/D21-v2.pdf, August 2013.
    • (2013) The NESSIE Consortium
    • Van Rompay, B.A.1    Ors, S.B.2    Preneel, B.3
  • 36
    • 33845429016 scopus 로고    scopus 로고
    • A case against currently used hash functions in RFID protocols
    • Meersman R, Tari Z, Herrero P (eds.), Springer-Verlag
    • Feldhofer M, Rechberger C. A case against currently used hash functions in RFID protocols. In Lecture Notes in Computer Science 4277, Meersman R, Tari Z, Herrero P (eds.), Springer-Verlag, 2006, pp.372-381.
    • (2006) Lecture Notes in Computer Science 4277 , pp. 372-381
    • Feldhofer, M.1    Rechberger, C.2
  • 38
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Yung M (ed.), Springer
    • Black J, Rogaway P, Shrimpton T. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Lecture Notes in Computer Science 2442, Yung M (ed.), Springer, 2002, pp. 320-335.
    • (2002) Lecture Notes in Computer Science 2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 40
    • 84985820553 scopus 로고
    • Hash functions based on block ciphers
    • Rueppel R A (ed.), Springer
    • Lai X, Massey J. Hash functions based on block ciphers. In Lecture Notes in Computer Science 658, Rueppel R A (ed.), Springer, 1993, pp.55-70.
    • (1993) Lecture Notes in Computer Science 658 , pp. 55-70
    • Lai, X.1    Massey, J.2
  • 41
    • 79956325553 scopus 로고    scopus 로고
    • Analysis of hardware encryption versus software encryption on wireless sensor network motes
    • Mukhopadhyay S C, Gupta G S (eds.), Springer
    • Healy M, Newe T, Lewis E. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In Lecture Notes in Electrical Engineering 20, Mukhopadhyay S C, Gupta G S (eds.), Springer, 2008, pp.3-14.
    • (2008) Lecture Notes in Electrical Engineering , vol.20 , pp. 3-14
    • Healy, M.1    Newe, T.2    Lewis, E.3
  • 42
    • 79958010336 scopus 로고    scopus 로고
    • Pushing the limits: A very compact and a threshold implementation of AES
    • Paterson K G (ed.), Springer-Verlag
    • Moradi A, Poschmann A, Ling S, Paar C, Wang H. Pushing the limits: A very compact and a threshold implementation of AES. In Lecture Notes in Computer Science 6632, Paterson K G (ed.), Springer-Verlag, 2011, pp.69-88.
    • (2011) Lecture Notes in Computer Science , vol.6632 , pp. 69-88
    • Moradi, A.1    Poschmann, A.2    Ling, S.3    Paar, C.4    Wang, H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.