-
3
-
-
45849120977
-
ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring
-
University of Virginia
-
Wood A, Virone G, Doan T, Cao Q, Selavo L, Wu Y, Fang L, He Z, Lin S, Stankovic J. ALARM-NET: Wireless sensor networks for assisted-living and residential monitoring. Technical Report, Department of Computer Science, University of Virginia, 2006.
-
(2006)
Technical Report, Department of Computer Science
-
-
Wood, A.1
Virone, G.2
Doan, T.3
Cao, Q.4
Selavo, L.5
Wu, Y.6
Fang, L.7
He, Z.8
Lin, S.9
Stankovic, J.10
-
5
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar J D. SPINS: Security protocols for sensor networks. In Proc. the 7th Annual International Conference on Mobile Computing and Networking, July 2001, pp.189-199.
-
(2001)
Proc the 7th Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
7
-
-
33751033221
-
SenSec design
-
Technical Report-TR v1.0, February
-
Li T, Wu H, Wang X, Bao F. SenSec design. Technical Report, I2R Sensor Network Flagship Project (SNFP: Security part), Technical Report-TR v1.0, February 2005.
-
(2005)
Technical Report, I2R Sensor Network Flagship Project (SNFP: Security Part)
-
-
Li, T.1
Wu, H.2
Wang, X.3
Bao, F.4
-
8
-
-
35348897342
-
MiniSec: A secure sensor network communication architecture
-
April
-
Luk M, Mezzour G, Perrig A, Gligor V. MiniSec: A secure sensor network communication architecture. In Proc. the 6th IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2007, pp.479-488.
-
(2007)
Proc the 6th IEEE International Conference on Information Processing in Sensor Networks (IPSN)
, pp. 479-488
-
-
Luk, M.1
Mezzour, G.2
Perrig, A.3
Gligor, V.4
-
10
-
-
26444532494
-
OCB: A block-cipher mode of operation for e ± cient authenticated encryption
-
10.1145/937527.937529
-
Rogaway P, Bellare M, Black J. OCB: A block-cipher mode of operation for e ± cient authenticated encryption. ACM Transactions on Information and System Security, 2003, 6(3): 365-403.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 365-403
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
-
11
-
-
0013091373
-
-
Information Technology Laboratory, National Institute of Standards and Technology of U.S. Federal Information Processing Standards Publication, FIPS PUB 198 Oct. 2013
-
Information Technology Laboratory, National Institute of Standards and Technology of U.S. The keyed-hash message authentication code (HMAC). Federal Information Processing Standards Publication, FIPS PUB 198. http://csrc.nist. gov/publications/ps/ps198/ps-198a.pdf, Oct. 2013.
-
The Keyed-hash Message Authentication Code (HMAC)
-
-
-
12
-
-
51049092732
-
Hash functions and RFID tags: Mind the gap
-
Oswald E, Rohatgi P (eds.), Springer-Verlag
-
Bogdanov A, Leander G, Paar C, Poschmann A, Robshaw M J B, Seurin Y. Hash functions and RFID tags: Mind the gap. In Lecture Notes in Computer Science 5154, Oswald E, Rohatgi P (eds.), Springer-Verlag, 2008, pp.283-299.
-
(2008)
Lecture Notes in Computer Science 5154
, pp. 283-299
-
-
Bogdanov, A.1
Leander, G.2
Paar, C.3
Poschmann, A.4
Robshaw, M.J.B.5
Seurin, Y.6
-
13
-
-
26444575926
-
A new MAC construction ALRED and a specīc instance ALPHA-MAC
-
Gilbert H, Handschuh H (eds.), Springer-Verlag
-
Daemen J, Rijmen V. A new MAC construction ALRED and a specīc instance ALPHA-MAC. In Lecture Notes in Computer Science 3557, Gilbert H, Handschuh H (eds.), Springer-Verlag, 2005, pp.1-17.
-
(2005)
Lecture Notes in Computer Science 3557
, pp. 1-17
-
-
Daemen, J.1
Rijmen, V.2
-
14
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Paillier P, Verbauwhede I (eds.), Springer Heidelberg
-
Bogdanov A, Knudsen L R, Leander G, et al. PRESENT: An ultra-lightweight block cipher. In Lecture Notes in Computer Science 4727, Paillier P, Verbauwhede I (eds.), Springer Heidelberg, 2007, pp.450-466.
-
(2007)
Lecture Notes in Computer Science 4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
-
15
-
-
38049082754
-
On the internal structure of ALPHA-MAC
-
Nguyen P Q (ed.), Springer-Verlag
-
Huang J, Seberry J, Susilo W. On the internal structure of ALPHA-MAC. In Lecture Notes in Computer Science 4341, Nguyen P Q (ed.), Springer-Verlag, 2006, pp.271-285.
-
(2006)
Lecture Notes in Computer Science 4341
, pp. 271-285
-
-
Huang, J.1
Seberry, J.2
Susilo, W.3
-
16
-
-
38049029097
-
Collision attacks on AES-based MAC: ALPHA-MAC
-
Paillier P, Verbauwhede I (eds.), Springer-Verlag
-
Biryukov A, Bogdanov A, Khovratovich D, Kasper T. Collision attacks on AES-based MAC: ALPHA-MAC. In Lecture Notes in Computer Science 4727, Paillier P, Verbauwhede I (eds.), Springer-Verlag, 2007, pp.166-180.
-
(2007)
Lecture Notes in Computer Science 4727
, pp. 166-180
-
-
Biryukov, A.1
Bogdanov, A.2
Khovratovich, D.3
Kasper, T.4
-
19
-
-
77649256427
-
Towards secure and practical MACs for body sensor networks
-
Roy B K, Sendrier N (eds.), Springer-Verlag
-
Gong Z, Hartel P, Nikova S, Zhu B. Towards secure and practical MACs for body sensor networks. In Lecture Notes in Computer Science 5922, Roy B K, Sendrier N (eds.), Springer-Verlag, 2009, pp.182-198.
-
(2009)
Lecture Notes in Computer Science 5922
, pp. 182-198
-
-
Gong, Z.1
Hartel, P.2
Nikova, S.3
Zhu, B.4
-
21
-
-
80053502266
-
SPONGENT: A lightweight hash function
-
Preneel B, Takagi T (eds.), Springer-Verlag
-
Bogdanov A, Knežević M, Leander G, Toz D, Varici K, Verbauwhede I. SPONGENT: A lightweight hash function. In Lecture Notes in Computer Science 6917, Preneel B, Takagi T (eds.), Springer-Verlag, 2011, pp.312-325.
-
(2011)
Lecture Notes in Computer Science 6917
, pp. 312-325
-
-
Bogdanov, A.1
Knežević, M.2
Leander, G.3
Toz, D.4
Varici, K.5
Verbauwhede, I.6
-
22
-
-
45449086242
-
Differential cryptanalysis of reduced-round PRESENT
-
Vaudenay S (ed.), Springer-Verlag
-
Wang M. Differential cryptanalysis of reduced-round PRESENT. In Lecture Notes in Computer Science 5023, Vaudenay S (ed.), Springer-Verlag, 2008, pp.40-49.
-
(2008)
Lecture Notes in Computer Science 5023
, pp. 40-49
-
-
Wang, M.1
-
23
-
-
70350378884
-
Algebraic techniques in di®erential crypt-analysis
-
Dunkelman O (ed.), Springer-Verlag
-
Albrecht M, Cid C. Algebraic techniques in di®erential crypt-analysis. In Lecture Notes in Computer Science 5665, Dunkelman O (ed.), Springer-Verlag, 2009, pp.193-208.
-
(2009)
Lecture Notes in Computer Science 5665
, pp. 193-208
-
-
Albrecht, M.1
Cid, C.2
-
24
-
-
67650119051
-
A statistical saturation attack against the block cipher PRESENT
-
Fischlin M (ed.), Springer-Verlag
-
Collard B, Standaert F X. A statistical saturation attack against the block cipher PRESENT. In Lecture Notes in Computer Science 5473, Fischlin M (ed.), Springer-Verlag, 2009, pp.195-210.
-
(2009)
Lecture Notes in Computer Science 5473
, pp. 195-210
-
-
Collard, B.1
Standaert, F.X.2
-
25
-
-
70350681087
-
Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT
-
Boyd C, Nieto J G (eds.), Springer-Verlag
-
Ozen O, Varici K, Tezcan C, Kocair C. Lightweight block ciphers revisited: Cryptanalysis of reduced round PRESENT and HIGHT. In Lecture Notes in Computer Science 5594, Boyd C, Nieto J G (eds.), Springer-Verlag, 2009, pp.90-107.
-
(2009)
Lecture Notes in Computer Science 5594
, pp. 90-107
-
-
Ozen, O.1
Varici, K.2
Tezcan, C.3
Kocair, C.4
-
29
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
10.1006/jcss.1999.1694 0970.68054 1800307
-
Bellare M, Kilian J, Rogaway P. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences, 2000, 61(3): 362-399.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
30
-
-
17444383008
-
CBC MACs for arbitrary-length messages: The three-key constructions
-
10.1007/s00145-004-0016-3 1084.68045 2148054
-
Black J, Rogaway P. CBC MACs for arbitrary-length messages: The three-key constructions. Journal of Cryptology, 2005, 18(2): 111-131.
-
(2005)
Journal of Cryptology
, vol.18
, Issue.2
, pp. 111-131
-
-
Black, J.1
Rogaway, P.2
-
32
-
-
84957068240
-
UMAC: Fast and secure massage authentication
-
Wiener M (ed.), Springer-Verlag
-
Black J, Halevi S, Krawczyk H, Krovetz T, Rogaway P. UMAC: Fast and secure massage authentication. In Lecture Notes in Computer Science 1666, Wiener M (ed.), Springer-Verlag, 1999, pp.216-233.
-
(1999)
Lecture Notes in Computer Science 1666
, pp. 216-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
33
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz N (ed.), Springer-Verlag
-
Bellare M, Canetti R, Krawczyk H. Keying hash functions for message authentication. In Lecture Notes in Computer Science 1109, Koblitz N (ed.), Springer-Verlag, 1996, pp.1-15.
-
(1996)
Lecture Notes in Computer Science 1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
34
-
-
84893242674
-
Performance of optimized implementations of the NESSIE primitives (v2.0 edition)
-
August
-
Preneel B, van Rompay B, Ä Ors S B, et al. Performance of optimized implementations of the NESSIE primitives (v2.0 edition). In The NESSIE Consortium, http://www.cosic.esat.kuleuven.be/nessie/deliverables/D21-v2.pdf, August 2013.
-
(2013)
The NESSIE Consortium
-
-
Van Rompay, B.A.1
Ors, S.B.2
Preneel, B.3
-
35
-
-
77649254223
-
New designs in lightweight symmetric encryption
-
Kitsos P, Zhang Y (eds.), Springer
-
Paar C, Poschmann A, Robshaw M J B. New designs in lightweight symmetric encryption. In RFID Security: Techniques, Protocols and System-on-Chip Design, Kitsos P, Zhang Y (eds.), Springer, 2008, pp.349-371.
-
(2008)
RFID Security: Techniques, Protocols and System-on-Chip Design
, pp. 349-371
-
-
Paar, C.1
Poschmann, A.2
Robshaw, M.J.B.3
-
36
-
-
33845429016
-
A case against currently used hash functions in RFID protocols
-
Meersman R, Tari Z, Herrero P (eds.), Springer-Verlag
-
Feldhofer M, Rechberger C. A case against currently used hash functions in RFID protocols. In Lecture Notes in Computer Science 4277, Meersman R, Tari Z, Herrero P (eds.), Springer-Verlag, 2006, pp.372-381.
-
(2006)
Lecture Notes in Computer Science 4277
, pp. 372-381
-
-
Feldhofer, M.1
Rechberger, C.2
-
38
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
Yung M (ed.), Springer
-
Black J, Rogaway P, Shrimpton T. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Lecture Notes in Computer Science 2442, Yung M (ed.), Springer, 2002, pp. 320-335.
-
(2002)
Lecture Notes in Computer Science 2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
39
-
-
67650656024
-
Cryptanalysis of MDC-2
-
Joux A (ed.), Springer
-
Knudsen L, Mendel F, Rechberger C, Thomsen S. Cryptanalysis of MDC-2. In Lecture Notes in Computer Science 5479, Joux A (ed.), Springer, 2009, pp.106-120.
-
(2009)
Lecture Notes in Computer Science 5479
, pp. 106-120
-
-
Knudsen, L.1
Mendel, F.2
Rechberger, C.3
Thomsen, S.4
-
40
-
-
84985820553
-
Hash functions based on block ciphers
-
Rueppel R A (ed.), Springer
-
Lai X, Massey J. Hash functions based on block ciphers. In Lecture Notes in Computer Science 658, Rueppel R A (ed.), Springer, 1993, pp.55-70.
-
(1993)
Lecture Notes in Computer Science 658
, pp. 55-70
-
-
Lai, X.1
Massey, J.2
-
41
-
-
79956325553
-
Analysis of hardware encryption versus software encryption on wireless sensor network motes
-
Mukhopadhyay S C, Gupta G S (eds.), Springer
-
Healy M, Newe T, Lewis E. Analysis of hardware encryption versus software encryption on wireless sensor network motes. In Lecture Notes in Electrical Engineering 20, Mukhopadhyay S C, Gupta G S (eds.), Springer, 2008, pp.3-14.
-
(2008)
Lecture Notes in Electrical Engineering
, vol.20
, pp. 3-14
-
-
Healy, M.1
Newe, T.2
Lewis, E.3
-
42
-
-
79958010336
-
Pushing the limits: A very compact and a threshold implementation of AES
-
Paterson K G (ed.), Springer-Verlag
-
Moradi A, Poschmann A, Ling S, Paar C, Wang H. Pushing the limits: A very compact and a threshold implementation of AES. In Lecture Notes in Computer Science 6632, Paterson K G (ed.), Springer-Verlag, 2011, pp.69-88.
-
(2011)
Lecture Notes in Computer Science
, vol.6632
, pp. 69-88
-
-
Moradi, A.1
Poschmann, A.2
Ling, S.3
Paar, C.4
Wang, H.5
|