메뉴 건너뛰기




Volumn , Issue , 2016, Pages 3058-3063

A lightweight white-box symmetric encryption algorithm against node capture for WSNs

Author keywords

Node capture; Sensor networks; Symmetric encryption algorithm; White box attack context

Indexed keywords

CRYPTOGRAPHY; SENSOR NETWORKS; TABLE LOOKUP;

EID: 84912099206     PISSN: 15253511     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WCNC.2014.6952994     Document Type: Conference Paper
Times cited : (6)

References (25)
  • 4
    • 67651183943 scopus 로고    scopus 로고
    • Mitigation of control channel jamming under node capture attacks
    • P. Tague. "Mitigation of Control Channel Jamming under Node Capture Attacks. " IEEE Transactions on Mobile Computing. Vol. 8, No. 9, 2009, pp. 1221-1234
    • (2009) IEEE Transactions on Mobile Computing. , vol.8 , Issue.9 , pp. 1221-1234
    • Tague, P.1
  • 5
    • 84861459260 scopus 로고    scopus 로고
    • Exact formulae for resilience in random key predistribution schemes
    • D. H. Yum, "Exact Formulae for Resilience in Random Key Predistribution Schemes. " IEEE Transactions on Wireless Communications. Vol. 11,No. 5, 2012, pp 1638-1642
    • (2012) IEEE Transactions on Wireless Communications. , vol.11 , Issue.5 , pp. 1638-1642
    • Yum, D.H.1
  • 14
    • 84984964164 scopus 로고    scopus 로고
    • White-box cryptography and a white-box implementation of the SMS4 algorithm
    • Y. Xiao, X. Lai. "White-box cryptography and a white-box implementation of the SMS4 algorithm. " In Proc. Chaincrypto 2009, pp. 24-34
    • (2009) Proc. Chaincrypto , pp. 24-34
    • Xiao, Y.1    Lai, X.2
  • 18
    • 80052793223 scopus 로고    scopus 로고
    • Protecting white-box AES with dual ciphers
    • In K. Rhee and D. Nyang, editors
    • M. Karroumi, "Protecting white-box AES with dual ciphers. " In K. Rhee and D. Nyang, editors, ICISC, volume 6829 of Lecture Notes in Computer Science, pp. 278-291
    • ICISC 6829 of Lecture Notes in Computer Science , pp. 278-291
    • Karroumi, M.1
  • 21
    • 84958748914 scopus 로고    scopus 로고
    • In how many ways can you write Rijndael?
    • Zheng, Y. (ed. )
    • E. Barkan, E. Biham, "In how many ways can you write Rijndael?" In: Zheng, Y. (ed. ) ASIACRYPT 2002. LNCS, vol. 2501, pp. 160-175
    • ASIACRYPT 2002. LNCS , vol.2501 , pp. 160-175
    • Barkan, E.1    Biham, E.2
  • 22
    • 24144476253 scopus 로고    scopus 로고
    • More dual Rijndaels
    • H. Dobbertin, V. Rijmen, A. Sowa (eds. )
    • H. Raddum, More dual Rijndaels. In: H. Dobbertin, V. Rijmen, A. Sowa (eds. ) AES 2005. LNCS, vol. 3373, pp. 142-147
    • AES 2005. LNCS , vol.3373 , pp. 142-147
    • Raddum, H.1
  • 25
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • F. Hohl, "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Lecture Notes in Computer Science, Vol. 1419, 1998, pp. 92-113.
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 92-113
    • Hohl, F.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.