-
1
-
-
84858719793
-
A survey on wireless sensor network: An application perspective
-
G. R. Sakthidharan and S. Chitra, "A survey on wireless sensor network: An application perspective," in Proc. ICCCI, Jan. 2012, pp. 1-5.
-
Proc. ICCCI, Jan. 2012
, pp. 1-5
-
-
Sakthidharan, G.R.1
Chitra, S.2
-
2
-
-
84887731166
-
Survey and benchmark of lightweight block ciphers for WSNs
-
M. Cazorla, K. Marquet, and M. Minier, "Survey and benchmark of lightweight block ciphers for WSNs," in Proc. Int. Conf. Secur. Cryptograph., Jul. 2013, pp. 543-548.
-
Proc. Int. Conf. Secur. Cryptograph., Jul. 2013
, pp. 543-548
-
-
Cazorla, M.1
Marquet, K.2
Minier, M.3
-
5
-
-
24944505936
-
Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials
-
E. Biham, A. Biryukov, and A. Shamir, "Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials," J. Cryptol., vol. 18, no. 4, pp. 291-311, 2005.
-
(2005)
J. Cryptol.
, vol.18
, Issue.4
, pp. 291-311
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
6
-
-
0006540774
-
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
-
st Int. Conf. ICICS, 1997, pp. 233-246.
-
st Int. Conf. ICICS, 1997
, pp. 233-246
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
8
-
-
82955189841
-
Biclique Crypt-analysis of the Full AES
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
A. Bogdanov, D. Khovratovich, and C. Rechberger, "Biclique crypt-analysis of the full AES," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7073. Berlin, Germany: Springer-Verlag, 2011, pp. 344-371.
-
(2011)
Lecture Notes in Computer Science
, vol.7073
, pp. 344-371
-
-
Bogdanov, A.1
Khovratovich, D.2
Rechberger, C.3
-
9
-
-
84863152843
-
A novel block encryption scheme based on chaos and an S-box for wireless sensor networks
-
T. Xiao-Jun, W. Zhu, and Z. Ke, "A novel block encryption scheme based on chaos and an S-box for wireless sensor networks," J. Chin. Phys. B, vol. 21, no. 2, p. 020506, 2012.
-
(2012)
J. Chin. Phys. B
, vol.21
, Issue.2
, pp. 020506
-
-
Xiao-Jun, T.1
Zhu, W.2
Ke, Z.3
-
10
-
-
70350589237
-
KATAN and KTANTAN - A Family of Small and Efficient Hardware-oriented Block Ciphers
-
Berlin, Germany: Springer-Verlag
-
C. De Cannière, O. Dunkelman, and M. Knežević, "KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers," in Cryptographic Hardware and Embedded Systems, vol. 5747. Berlin, Germany: Springer-Verlag, 2009, pp. 272-288.
-
(2009)
Cryptographic Hardware and Embedded Systems
, vol.5747
, pp. 272-288
-
-
De Cannière, C.1
Dunkelman, O.2
Knežević, M.3
-
11
-
-
78650841310
-
Conditional Differential Cryptanalysis of NLFSR-based Cryptosystems
-
Advances in Cryptology, Berlin, Germany: Springer-Verlag
-
S. Knellwolf, W. Meier, and M. Naya-Plasencia, "Conditional differential cryptanalysis of NLFSR-based cryptosystems," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6477. Berlin, Germany: Springer-Verlag, 2010, pp. 130-145.
-
(2010)
Lecture Notes in Computer Science
, vol.6477
, pp. 130-145
-
-
Knellwolf, S.1
Meier, W.2
Naya-Plasencia, M.3
-
12
-
-
84857711684
-
Conditional Differential Cryptanalysis of Trivium and KATAN
-
Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
-
S. Knellwolf, W. Meier, and M. Naya-Plasencia, "Conditional differential cryptanalysis of trivium and KATAN," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 7118. Berlin, Germany: Springer-Verlag, 2012, pp. 200-212.
-
(2012)
Lecture Notes in Computer Science
, vol.7118
, pp. 200-212
-
-
Knellwolf, S.1
Meier, W.2
Naya-Plasencia, M.3
-
13
-
-
79960205944
-
Improved Meet-in-the-middle Cryptanalysis of KTANTAN
-
(Poster)," in Information Security and Privacy, Berlin, Germany: Springer-Verlag
-
L. Wei, C. Rechberger, J. Guo, H. Wu, H. Wang, and S. Ling, "Improved meet-in-the-middle cryptanalysis of KTANTAN (Poster)," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 6812. Berlin, Germany: Springer-Verlag, 2011, pp. 433-438.
-
(2011)
Lecture Notes in Computer Science
, vol.6812
, pp. 433-438
-
-
Wei, L.1
Rechberger, C.2
Guo, J.3
Wu, H.4
Wang, H.5
Ling, S.6
-
14
-
-
80053476418
-
The LED Block Cipher
-
Cryptographic Hardware and Embedded Systems, Berlin, Germany: Springer-Verlag
-
J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, "The LED block cipher," in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2011, pp. 326-341.
-
(2011)
Lecture Notes in Computer Science
, pp. 326-341
-
-
Guo, J.1
Peyrin, T.2
Poschmann, A.3
Robshaw, M.4
-
15
-
-
84864807560
-
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo
-
Information Security and Privacy, Berlin, Germany: Springer-Verlag
-
T. Isobe and K. Shibutani, "Security analysis of the lightweight block ciphers XTEA, LED and piccolo," in Information Security and Privacy (Lecture Notes in Computer Science), vol. 7372. Berlin, Germany: Springer-Verlag, 2012, pp. 71-86.
-
(2012)
Lecture Notes in Computer Science
, vol.7372
, pp. 71-86
-
-
Isobe, T.1
Shibutani, K.2
-
16
-
-
84871585930
-
Differential Analysis of the LED Block Cipher
-
Advances in Cryptology Berlin, Germany: Springer-Verlag
-
F. Mendel, V. Rijmen, D. Toz, and K. Varici, "Differential analysis of the LED block cipher," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7658. Berlin, Germany: Springer-Verlag, 2012, pp. 190-207.
-
(2012)
Lecture Notes in Computer Science
, vol.7658
, pp. 190-207
-
-
Mendel, F.1
Rijmen, V.2
Toz, D.3
Varici, K.4
-
17
-
-
84872542511
-
TWINE: A Lightweight Block Cipher for Multiple Platforms
-
Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
-
T. Suzaki, K. Minematsu, S. Morioka, and E. Kobayashi, "TWINE: A lightweight block cipher for multiple platforms," in Selected Areas in Cryptography (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2012, pp. 339-354.
-
(2012)
Lecture Notes in Computer Science
, pp. 339-354
-
-
Suzaki, T.1
Minematsu, K.2
Morioka, S.3
Kobayashi, E.4
-
18
-
-
84872708211
-
Biclique cryptanalysis of TWINE
-
Cryptology and Network Security, Berlin, Germany: Springer-Verlag [Online]. Available
-
M. Çoban, F. Karakoç, and O. Boztaş, "Biclique cryptanalysis of TWINE," in Cryptology and Network Security, vol. 7712 (LNCS). Berlin, Germany: Springer-Verlag, 2012, pp. 43-55. [Online]. Available: http://eprint.iacr.org
-
(2012)
LNCS
, vol.7712
, pp. 43-55
-
-
Çoban, M.1
Karakoç, F.2
Boztaş, O.3
-
19
-
-
84893046807
-
A Simple Lightweight Encryption Scheme for Wireless Sensor Networks
-
Distributed Computing and Networking, Berlin, Germany: Springer-Verlag
-
K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, "A simple lightweight encryption scheme for wireless sensor networks,"in Distributed Computing and Networking (Lecture Notes in Computer Science), vol. 8314. Berlin, Germany: Springer-Verlag, 2014, pp. 499-504.
-
(2014)
Lecture Notes in Computer Science
, vol.8314
, pp. 499-504
-
-
Biswas, K.1
Muthukkumarasamy, V.2
Sithirasenan, E.3
Singh, K.4
-
20
-
-
46749131960
-
Chaos block cipher for wireless sensor network
-
S. Chen, X. Zhong, and Z. Wu, "Chaos block cipher for wireless sensor network," J. Sci. China Ser. F, Inf. Sci., vol. 51, no. 8, pp. 1055-1063, 2008.
-
(2008)
J. Sci. China Ser. F, Inf. Sci.
, vol.51
, Issue.8
, pp. 1055-1063
-
-
Chen, S.1
Zhong, X.2
Wu, Z.3
-
21
-
-
77956058248
-
Cryptanalysis of a chaos block cipher for wireless sensor network
-
J. Yang, D. Xiao, and T. Xiang, "Cryptanalysis of a chaos block cipher for wireless sensor network," Commun. Nonlinear Sci. Numer. Simul., vol. 16, no. 2, pp. 844-850, 2011.
-
(2011)
Commun. Nonlinear Sci. Numer. Simul.
, vol.16
, Issue.2
, pp. 844-850
-
-
Yang, J.1
Xiao, D.2
Xiang, T.3
-
22
-
-
79951617961
-
Design and statistical analysis of a new chaos block cipher for WSN
-
Y. Liu and S. Tian, "Design and statistical analysis of a new chaos block cipher for WSN," in Proc. IEEE ICITIS, Dec. 2010, pp. 327-330.
-
Proc. IEEE ICITIS, Dec. 2010
, pp. 327-330
-
-
Liu, Y.1
Tian, S.2
-
24
-
-
84926437155
-
-
[Online]. Available
-
NIST. (2014). Download Documentation and Software. [Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/rng/documentation-software.html
-
(2014)
Download Documentation and Software
-
-
NIST1
-
25
-
-
55349129633
-
A chaos-based secure cluster protocol for wireless sensor networks
-
Q. Fang, Y. Liu, and X. Zhao, "A chaos-based secure cluster protocol for wireless sensor networks," Kybernetika, vol. 44, no. 4, pp. 522-533, 2008.
-
(2008)
Kybernetika
, vol.44
, Issue.4
, pp. 522-533
-
-
Fang, Q.1
Liu, Y.2
Zhao, X.3
-
26
-
-
84865198377
-
Encryption of Images Based on Genetic Algorithm - A New Approach
-
Advances in Computer Science, Engineering & Applications Berlin, Germany: Springer-Verlag
-
J. Kumar and S. Nirmala, "Encryption of images based on genetic algorithm - A new approach," in Advances in Computer Science, Engineering & Applications (Advances in Intelligent Systems and Computing), vol. 167. Berlin, Germany: Springer-Verlag, 2012, pp. 783-791.
-
(2012)
Advances in Intelligent Systems and Computing
, vol.167
, pp. 783-791
-
-
Kumar, J.1
Nirmala, S.2
-
27
-
-
35248822352
-
Encryption-scheme Security in the Presence of Key-dependent Messages
-
Selected Areas in Cryptography, Berlin, Germany: Springer-Verlag
-
J. Black, P. Rogaway, and T. Shrimpton, "Encryption-scheme security in the presence of key-dependent messages," in Selected Areas in Cryptography (Lecture Notes in Computer Science), vol. 2595. Berlin, Germany: Springer-Verlag, 2003, pp. 62-75.
-
(2003)
Lecture Notes in Computer Science
, vol.2595
, pp. 62-75
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
28
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway, "The security of the cipher block chaining message authentication code," J. Comput. Syst. Sci., vol. 61, no. 3, pp. 363-399, 2000.
-
(2000)
J. Comput. Syst. Sci.
, vol.61
, Issue.3
, pp. 363-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
30
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," ACM SIGPLAN Notices, vol. 35, no. 11, pp. 93-104, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
|