-
1
-
-
84943760004
-
-
(http://www.atmel.com/products/microcontrollers/avr/megaavr.aspx)
-
-
-
-
4
-
-
0005246691
-
-
Adams, Carlisle RFC 2612. USA, June
-
Adams, Carlisle. The CAST-256 encryption algorithm, RFC 2612. USA, June; 1999.
-
(1999)
The CAST-256 Encryption Algorithm
-
-
-
5
-
-
84893000417
-
-
Altera Inc.
-
Altera Inc., Quartus II Introduction Using Verilog Designs [online], Available at: ftp://ftp.altera.com/up/pub/Altera-Material/9.1/Tutorials/Verilog/Quartus-II-Introduction.pdf.
-
Quartus II Introduction Using Verilog Designs
-
-
-
6
-
-
84860253312
-
Security and privacy issues in wireless sensor networks for healthcare applications
-
M. Ameen, J. Liu, and K. Kwak Security and privacy issues in wireless sensor networks for healthcare applications J Med Syst 36 1 2012 93 101
-
(2012)
J Med Syst
, vol.36
, Issue.1
, pp. 93-101
-
-
Ameen, M.1
Liu, J.2
Kwak, K.3
-
7
-
-
56449087483
-
Energy conservation in wireless sensor networks: A survey
-
G. Anastasi, M. Conti, M. Francesco, and A. Passarella Energy conservation in wireless sensor networks: a survey Ad Hoc Netw 7 3 2009 537 568
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.3
, pp. 537-568
-
-
Anastasi, G.1
Conti, M.2
Francesco, M.3
Passarella, A.4
-
9
-
-
84949218850
-
Camellia: A 128-bit block cipher suitable for multiple platforms - Design andanalysis
-
Springer Berlin Heidelberg
-
K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima, and T. Tokita Camellia: a 128-bit block cipher suitable for multiple platforms - design andanalysis. Selected areas in cryptography 2001 Springer Berlin Heidelberg 39 56
-
(2001)
Selected Areas in Cryptography
, pp. 39-56
-
-
Aoki, K.1
Ichikawa, T.2
Kanda, M.3
Matsui, M.4
Moriai, S.5
Nakajima, J.6
Tokita, T.7
-
10
-
-
84943787306
-
-
Atmel 8-bit AVR Microcontroller: ATtiny25/ ATtiny45 / ATtiny85 [on-line], December
-
Atmel 8-bit AVR Microcontroller: ATtiny25/ ATtiny45 / ATtiny85 [on-line] (http://www.atmel.com/Images/Atmel-2586-AVR-8-bit-Microcontroller-ATtiny25-ATtiny45-ATtiny85-Datasheet.pdf), December, 2013.
-
(2013)
-
-
-
11
-
-
77956877124
-
The internet of things: A survey
-
54.15
-
Luigi Atzori, Antonio Iera, and Giacomo Morabito The internet of things: a survey Comput Netw 54.15 2010 2787 2805
-
(2010)
Comput Netw
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
12
-
-
78049331003
-
ARMADILLO: A multi-purpose cryptographic primitive dedicated to hardware
-
Mangard Stefan, Standaert François-Xavier, Springer Berlin Heidelberg
-
S. Badel, N. Daʇtekin, J. Nakahara Jr, K. Ouafi, N. Reffé, P. Sepehrdad, P. Sušil, and S. Vaudenay ARMADILLO: a multi-purpose cryptographic primitive dedicated to hardware Mangard Stefan, Standaert François-Xavier, Cryptographic hardware and embedded systems, CHES 2010 2010 Springer Berlin Heidelberg 398 412
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES 2010
, pp. 398-412
-
-
Badel, S.1
Daʇtekin, N.2
Nakahara, J.3
Ouafi, K.4
Reffé, N.5
Sepehrdad, P.6
Sušil, P.7
Vaudenay, S.8
-
14
-
-
84943776550
-
-
Batina L, Batina A. Das B. Ege E.B. Kavun N. Mentens C. Paar I. Verbauwhede T. YalçIn Di. Science; 2013.
-
(2013)
Science
-
-
Batina, L.1
Batina, A.2
Das, B.3
Ege, E.B.4
Kavun, N.5
Mentens, C.6
Paar, I.7
Verbauwhede, T.8
Yalçin, Di.9
-
15
-
-
84898929519
-
Protection against hardware trojan attacks: Towards a comprehensive solution
-
Swarup Bhunia, Miron Abramovici, Dakshi Agrawal, Paul Bradley, Michael S. Hsiao, Jim Plusquellic, and Mohammad Tehranipoor Protection against hardware trojan attacks: towards a comprehensive solution IEEE Des Test 30 3 2013 6 17
-
(2013)
IEEE des Test
, vol.30
, Issue.3
, pp. 6-17
-
-
Bhunia, S.1
Abramovici, M.2
Agrawal, D.3
Bradley, P.4
Hsiao, M.S.5
Plusquellic, J.6
Tehranipoor, M.7
-
16
-
-
0342456314
-
Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials
-
Stern Jacques, Springer Berlin Heidelberg
-
Eli Biham, Alex Biryukov, and Adi Shamir Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials Stern Jacques, Advances in cryptology - eurocrypt'99 1999 Springer Berlin Heidelberg
-
(1999)
Advances in Cryptology - eurocrypt'99
-
-
Biham, E.1
Biryukov, A.2
Shamir, A.3
-
17
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
Paillier Pascal, Verbauwhede Ingrid, Springer Berlin Heidelberg
-
A. Bogdanov, L. Knudsen, G. Leander, C. Paar, A. Poschmann, M. Robshaw, Y. Seurin, and C. Vikkelsoe PRESENT: An ultra-lightweight block cipher Paillier Pascal, Verbauwhede Ingrid, Cryptographic hardware and embedded systems-CHES 2007 2007 Springer Berlin Heidelberg 450 466
-
(2007)
Cryptographic Hardware and Embedded Systems-CHES 2007
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.6
Seurin, Y.7
Vikkelsoe, C.8
-
18
-
-
84871538539
-
PRINCE-A low-latency block cipher for pervasive computing applications
-
Wang Xiaoyun, Sako Kazue, Springer Berlin Heidelberg
-
J. Borghoff, A. Canteaut, T. Güneysu, E. Bilge Kavun, M. Knezevic, L. Knudsen, G. Leander, and et al. PRINCE-a low-latency block cipher for pervasive computing applications Wang Xiaoyun, Sako Kazue, Advances in cryptology-ASIACRYPT 2012 2012 Springer Berlin Heidelberg 208 222
-
(2012)
Advances in Cryptology-ASIACRYPT 2012
, pp. 208-222
-
-
Borghoff, J.1
Canteaut, A.2
Güneysu, T.3
Bilge Kavun, E.4
Knezevic, M.5
Knudsen, L.6
Leander, G.7
-
19
-
-
84885225180
-
Architectures of flexible symmetric key crypto engines - A survey: From hardware coprocessor to multi-crypto-processor system on chip
-
Article no. 41, 41:1 - 41:32
-
L. Bossuet, M. Grand, L. Gaspar, V. Fischer, and G. Gogniat Architectures of flexible symmetric key crypto engines - a survey: From hardware coprocessor to multi-crypto-processor system on chip ACM Comput Surv 45 4 2013 Article no. 41, 41:1 - 41:32
-
(2013)
ACM Comput Surv
, vol.45
, Issue.4
-
-
Bossuet, L.1
Grand, M.2
Gaspar, L.3
Fischer, V.4
Gogniat, G.5
-
23
-
-
0010461175
-
-
Carman David W, Kruus Peter S, Matt Brian J. Constraints and approaches for distributed sensor network security (final) DARPA Project report,(Cryptographic Technologies Group, Trusted Information System, NAI Labs) 1; 2000 1.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security (Final) DARPA Project Report,(Cryptographic Technologies Group, Trusted Information System, NAI Labs)
, vol.1
, pp. 1
-
-
Carman David, W.1
Kruus Peter, S.2
Matt Brian, J.3
-
24
-
-
84887731166
-
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks
-
Cazorla M, Marquet K, and Minier M. Survey and benchmark of lightweight block ciphers for wireless sensor networks. In: Proceedings of the SECRYPT; 2013 (http://eprint.iacr.org/2013/295).
-
(2013)
Proceedings of the SECRYPT
-
-
Cazorla, M.1
Marquet, K.2
Minier, M.3
-
25
-
-
79956094375
-
Body area networks: A survey
-
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V.C. Leung Body area networks: a survey Mob Netw Appl 16 2 2011 171 193
-
(2011)
Mob Netw Appl
, vol.16
, Issue.2
, pp. 171-193
-
-
Chen, M.1
Gonzalez, S.2
Vasilakos, A.3
Cao, H.4
Leung, V.C.5
-
27
-
-
84861929653
-
Configuration tool for a wireless sensor network integrated security framework
-
Victor Cionca, Thomas Newe, and Vasile Teodor Dədârlat Configuration tool for a wireless sensor network integrated security framework J Netw Syst Manag 20 3 2012 417 452
-
(2012)
J Netw Syst Manag
, vol.20
, Issue.3
, pp. 417-452
-
-
Cionca, V.1
Newe, T.2
Dədârlat, V.T.3
-
28
-
-
84858140203
-
Security evaluation of GOST 28147-89 in view of international standardisation
-
36.1
-
Nicolas T. Courtois Security evaluation of GOST 28147-89 in view of international standardisation Cryptologia 36.1 2012 2 13
-
(2012)
Cryptologia
, pp. 2-13
-
-
Courtois, N.T.1
-
34
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel A survey of lightweight-cryptography implementations Des Test Comput IEEE 24 6 2007 522 533
-
(2007)
Des Test Comput IEEE
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
35
-
-
84864035544
-
Compact implementation and performance evaluation of block ciphers in ATtiny devices
-
Lecture notes in computer science
-
Eisenbarth T, Gong Z, Güneysu T, Heyse S, Indesteege S, Kerckhof S, Koeune F, Nad T, Plos T, Regazzoni F, Standaert F, Oldenzeel L. Compact implementation and performance evaluation of block ciphers in ATtiny devices, Progress in Cryptology-AFRICACRYPT 2012, Lecture notes in computer science, vol. 7374; 2012. p. 172-87.
-
(2012)
Progress in Cryptology-AFRICACRYPT 2012
, vol.7374
, pp. 172-187
-
-
Eisenbarth, T.1
Gong, Z.2
Güneysu, T.3
Heyse, S.4
Indesteege, S.5
Kerckhof, S.6
Koeune, F.7
Nad, T.8
Plos, T.9
Regazzoni, F.10
Standaert, F.11
Oldenzeel, L.12
-
36
-
-
84856112196
-
The Hummingbird-2 lightweight authenticated encryption algorithm
-
Springer Berlin Heidelberg
-
Daniel Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, and Eric M. Smith The Hummingbird-2 lightweight authenticated encryption algorithm RFID. Security and privacy 2012 Springer Berlin Heidelberg 19 31
-
(2012)
RFID. Security and Privacy
, pp. 19-31
-
-
Engels, D.1
Saarinen, M.-J.O.2
Schweitzer, P.3
Smith, E.M.4
-
37
-
-
84943779477
-
-
Technical Reports 29
-
Engels Daniel, Fan Xinxin, Gong Guang, Hu Honggang, Smith Eric M. Ultra-lightweight cryptography for low-cost RFID tags: hummingbird algorithm and protocol Centre for applied cryptographic research (CACR), Technical Reports 29; 2009.
-
(2009)
Ultra-lightweight Cryptography for Low-cost RFID Tags: Hummingbird Algorithm and Protocol Centre for Applied Cryptographic Research (CACR)
-
-
Daniel, E.1
Xinxin, F.2
Guang, G.3
Honggang, H.4
Smith Eric, M.5
-
39
-
-
84982266726
-
Wg-8: A lightweight stream cipher for resource-constrained smart devices
-
Springer Berlin Heidelberg
-
Xinxin Fan, Kalikinkar Mandal, and Guang Gong Wg-8: a lightweight stream cipher for resource-constrained smart devices Quality, reliability, security and robustness in heterogeneous networks 2013 Springer Berlin Heidelberg 617 632
-
(2013)
Quality, Reliability, Security and Robustness in Heterogeneous Networks
, pp. 617-632
-
-
Fan, X.1
Mandal, K.2
Gong, G.3
-
42
-
-
84857918206
-
A new image encryption scheme based on a chaotic function
-
Michael François, Thomas Grosges, Dominique Barchiesi, and Robert Erra A new image encryption scheme based on a chaotic function Signal Process: Image Commun 27 3 2012 249 259
-
(2012)
Signal Process: Image Commun
, vol.27
, Issue.3
, pp. 249-259
-
-
François, M.1
Grosges, T.2
Barchiesi, D.3
Erra, R.4
-
44
-
-
84856103472
-
KLEIN: A new family of lightweight block ciphers
-
Springer Berlin Heidelberg S. N.
-
Z. Gong, S. N., and Y. Law KLEIN: a new family of lightweight block ciphers. RFID. Security and privacy 2012 Springer Berlin Heidelberg 1 18
-
(2012)
RFID. Security and Privacy
, pp. 1-18
-
-
Gong, Z.1
Law, Y.2
-
47
-
-
84943767452
-
-
Jo Minho, ISSN 0020-0255
-
Han Nguyen Dinh, Han Longzhe, Tuan Dao Minh, and Peter Hoh Jo Minho, A scheme for data confidentiality in cloud-assisted wireless body area networks, Information sciences vol. 284 10 November 2014 157 166 ISSN 0020-0255
-
(2014)
A Scheme for Data Confidentiality in Cloud-assisted Wireless Body Area Networks, Information Sciences
, vol.284
, pp. 157-166
-
-
Nguyen Dinh, H.1
Longzhe, H.2
Dao Minh, T.3
Hoh, P.4
-
48
-
-
84910668271
-
An energy-efficient and security aware route selection protocol for wireless sensor networks
-
T. Hayajneh, R. Doomun, G. Al-Mashaqbeh, and B.J Mohd An energy-efficient and security aware route selection protocol for wireless sensor networks Secur. Comm. Netw. 7 2014 2015 2038 10.1002/sec.915
-
(2014)
Secur. Comm. Netw.
, vol.7
, pp. 2015-2038
-
-
Hayajneh, T.1
Doomun, R.2
Al-Mashaqbeh, G.3
Mohd, B.J.4
-
49
-
-
84910146997
-
A survey of wireless technologies coexistence in WBAN: Analysis and open research issues
-
Thaier Hayajneh, Ghada Almashaqbeh, Sana Ullah, and Athanasios V. Vasilakos A survey of wireless technologies coexistence in WBAN: analysis and open research issues Wirel Netw 20 8 2014 2165 2199
-
(2014)
Wirel Netw
, vol.20
, Issue.8
, pp. 2165-2199
-
-
Hayajneh, T.1
Almashaqbeh, G.2
Ullah, S.3
Vasilakos, A.V.4
-
50
-
-
84936053181
-
Public-key authentication for cloud-based WBANs
-
Hayajneh Thaier, Vasilakos Athanasios V. Almashaqbeh Ghada, Mohd Bassam J, Imran Muhammad A, Shakir Muhammad Z, Qaraqe Khalid A. Public-key authentication for cloud-based WBANs. In: Proceedings of the 9th International conference on body area networks 2014. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering); 2014. p. 286-292.
-
(2014)
Proceedings of the 9th International Conference on Body Area Networks 2014. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
, pp. 286-292
-
-
Thaier, H.1
Almashaqbeh, V.V.A.G.2
Mohd Bassam, J.3
Imran Muhammad, A.4
Shakir Muhammad, Z.5
Qaraqe Khalid, A.6
-
51
-
-
84943741055
-
An Enhanced WLAN Security System with FPGA implementation for multimedia applications
-
IEEE 10
-
Hayajneh Thaier, Ullah Sana, Mohd, BJ, Balagani, Kiran, An Enhanced WLAN Security System With FPGA implementation for multimedia applications, systems journal, IEEE, vol.PP, 99, pp.1,10, doi:10.1109/JSYST.2015.2424702.
-
Systems Journal
, vol.PP
, Issue.99
, pp. 1
-
-
Thaier, H.1
Sana, U.2
Mohd, B.J.3
Kiran, B.4
-
52
-
-
84870885560
-
A distributed trust evaluation model and its application scenarios for medical sensor networks
-
D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos A distributed trust evaluation model and its application scenarios for medical sensor networks IEEE Trans Inf Technol Biomed 16 6 2012 1164 1175
-
(2012)
IEEE Trans Inf Technol Biomed
, vol.16
, Issue.6
, pp. 1164-1175
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.5
-
53
-
-
84863512174
-
Retrust: Attack-resistant and lightweight trust management for medical sensor networks
-
D. He, C. Chen, S. Chan, J. Bu, and A. Vasilakos Retrust: Attack-resistant and lightweight trust management for medical sensor networks IEEE Trans Inf Technol Biomed 16 4 2012 623 632
-
(2012)
IEEE Trans Inf Technol Biomed
, vol.16
, Issue.4
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.5
-
54
-
-
84896470777
-
Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks
-
448, March
-
Daojing He, S. Chan, Yan Zhang, and Haomiao Yang Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks Biomed Health Inf IEEE Journal of 18 2 2014 440 10.1109/JBHI.2013.2293620 448, March
-
(2014)
Biomed Health Inf IEEE Journal of
, vol.18
, Issue.2
, pp. 440
-
-
He, D.1
Chan, S.2
Zhang, Y.3
Yang, H.4
-
55
-
-
77956964717
-
Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems
-
590590
-
Jun He,Haifeng Qian, Yuan Zhou, Zhibin Li, Cryptanalysis and Improvement of a Block Cipher Based on Multiple Chaotic Systems, Math. Probl. Eng., 2010, Article ID 590590, 14 pp., 2010. 10.1155/2010/590590
-
(2010)
Math. Probl. Eng.
, vol.14
-
-
He, J.1
Qian, H.2
Zhou, Y.3
Li, Z.4
-
56
-
-
3242773027
-
High-throughput programmable cryptocoprocessor
-
24.3
-
Alireza Hodjat, and Ingrid Verbauwhede High-throughput programmable cryptocoprocessor IEEE Micro 24.3 2004 34 45
-
(2004)
IEEE Micro
, pp. 34-45
-
-
Hodjat, A.1
Verbauwhede, I.2
-
57
-
-
33750699594
-
Hight: A new block cipher suitable for low-resource device
-
Springer Berlin Heidelberg
-
D. Hong, J. Sung, S. Hong, J. Lim, S. Lee, B. Koo, C. Lee, and et al. Hight: A new block cipher suitable for low-resource device Cryptographic hardware and embedded systems-CHES 2006 2006 Springer Berlin Heidelberg 46 59
-
(2006)
Cryptographic Hardware and Embedded Systems-CHES 2006
, pp. 46-59
-
-
Hong, D.1
Sung, J.2
Hong, S.3
Lim, J.4
Lee, S.5
Koo, B.6
Lee, C.7
-
58
-
-
84909991222
-
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
-
Jeju, Korea, 19-21 August
-
Hong, D.; Lee, J.K.; Kim, D.C.; Kwon, D.; Ryu, G.H.; Lee, D. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. In Proceedings of the 14th International Workshop on Information Security Applications, Jeju, Korea, 19-21 August 2013.
-
(2013)
Proceedings of the 14th International Workshop on Information Security Applications
-
-
Hong, D.1
Lee, J.K.2
Kim, D.C.3
Kwon, D.4
Ryu, G.H.5
Lee, D.6
-
59
-
-
84867301818
-
A privacy-strengthened scheme for e-healthcare monitoring system
-
C. Huang, H. Lee, and D.H. Lee A privacy-strengthened scheme for e-healthcare monitoring system Journal of Medical Systems 36 5 2012 2959 2971
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.5
, pp. 2959-2971
-
-
Huang, C.1
Lee, H.2
Lee, D.H.3
-
61
-
-
34250334357
-
Energy-memory-security tradeoffs in distributed sensor networks
-
Springer Berlin Heidelberg
-
David D. Hwang, Bo-Cheng Charles Lai, and Ingrid Verbauwhede Energy-memory-security tradeoffs in distributed sensor networks Ad-Hoc, mobile, and wireless networks 2004 Springer Berlin Heidelberg 70 81
-
(2004)
Ad-Hoc, Mobile, and Wireless Networks
, pp. 70-81
-
-
Hwang, D.D.1
Lai, B.-C.C.2
Verbauwhede, I.3
-
62
-
-
84943756999
-
-
Instruments, Texas. « MSP430F1611:16-bit Ultra-Low-Power»
-
Instruments, Texas. « MSP430F1611:16-bit Ultra-Low-Power» (http://www.ti.com/product/msp430f1611).
-
-
-
-
64
-
-
84907885405
-
-
International Technology Roadmap for Semiconductor
-
International Technology Roadmap for Semiconductor: 2012 Overall Roadmap Technology Characteristics (ORTC) Tables, [online] (http://www.itrs.net/Links/2012ITRS/Home2012.htm).
-
(2012)
Overall Roadmap Technology Characteristics (ORTC) Tables
-
-
-
66
-
-
38349005902
-
Comparative survey of high-performance cryptographic algorithm implementations on FPGAs
-
Kimmo Järvinen, Matti Tommiska, and Jorma Skyttä Comparative survey of high-performance cryptographic algorithm implementations on FPGAs IEE Proc-Inf Secur 152 1 2005 3 12
-
(2005)
IEE Proc-Inf Secur
, vol.152
, Issue.1
, pp. 3-12
-
-
Järvinen, K.1
Tommiska, M.2
Skyttä, J.3
-
69
-
-
84866649340
-
Towards green cryptography: A comparison of lightweight ciphers from the energy viewpoint
-
Springer Berlin Heidelberg
-
S. Kerckhof, F. Durvaux, C. Hocquet, D. Bol, and F.-X. Standaert. Towards green cryptography: a comparison of lightweight ciphers from the energy viewpoint Cryptographic hardware and embedded systems-CHES 2012 2012 Springer Berlin Heidelberg 390 407
-
(2012)
Cryptographic Hardware and Embedded Systems-CHES 2012
, pp. 390-407
-
-
Kerckhof, S.1
Durvaux, F.2
Hocquet, C.3
Bol, D.4
Standaert, F.-X.5
-
70
-
-
78049340840
-
PRINTcipher: A block cipher for IC-printing
-
Springer Berlin Heidelberg
-
Lars Knudsen, Gregor Leander, Axel Poschmann, and Matthew J.B. Robshaw PRINTcipher: a block cipher for IC-printing Cryptographic Hardware and Embedded Systems, CHES 2010 2010 Springer Berlin Heidelberg 16 32
-
(2010)
Cryptographic Hardware and Embedded Systems, CHES 2010
, pp. 16-32
-
-
Knudsen, L.1
Leander, G.2
Poschmann, A.3
Robshaw, M.J.B.4
-
72
-
-
4444346865
-
Chaos-based cryptography: A brief overview
-
Ljupčo Kocarev Chaos-based cryptography: a brief overview. Circuits Syst Mag IEEE 1 3 2001 6 21
-
(2001)
Circuits Syst Mag IEEE
, vol.1
, Issue.3
, pp. 6-21
-
-
Kocarev, L.1
-
74
-
-
84863011893
-
Security issues in healthcare applications using wireless medical sensor networks: A survey
-
P. Kumar, and H.-J. Lee Security issues in healthcare applications using wireless medical sensor networks: a survey Sensors 12 1 2012 55 91
-
(2012)
Sensors
, vol.12
, Issue.1
, pp. 55-91
-
-
Kumar, P.1
Lee, H.-J.2
-
76
-
-
84867018807
-
Sensor systems based on FPGAs and their applications: A survey
-
12.9
-
Antonio de la Piedra, An Braeken, and Abdellah Touhafi Sensor systems based on FPGAs and their applications: a survey Sensors 12.9 2012 12235 12264
-
(2012)
Sensors
, pp. 12235-12264
-
-
De La Piedra, A.1
Braeken, A.2
Touhafi, A.3
-
77
-
-
0002538320
-
A proposal for a new block encryption standard
-
Springer Berlin Heidelberg
-
X. Lai, and J.L. Massey A proposal for a new block encryption standard Advances in cryptology - EUROCRYPT'90 2006 Springer Berlin Heidelberg 389 404
-
(2006)
Advances in Cryptology - EUROCRYPT'90
, pp. 389-404
-
-
Lai, X.1
Massey, J.L.2
-
78
-
-
84943790133
-
-
Latitce Semiconductor, «HDL Coding Guidelines»
-
Latitce Semiconductor, «HDL Coding Guidelines», [online], (http://www.latticesemi.com/~/media/Documents/UserManuals/EI/HDLcodingguidelines.PDF)
-
-
-
-
79
-
-
79951723271
-
A survey on wireless body area networks
-
B. Latré, B. Braem, I. Moerman, C. Blondia, and P. Demeester A survey on wireless body area networks Wireless Networks 17 1 2011 1 18
-
(2011)
Wireless Networks
, vol.17
, Issue.1
, pp. 1-18
-
-
Latré, B.1
Braem, B.2
Moerman, I.3
Blondia, C.4
Demeester, P.5
-
80
-
-
33745269795
-
Survey and benchmark of block ciphers for wireless sensor networks
-
2.1
-
Y. Law, J. Doumen, and P. Hartel Survey and benchmark of block ciphers for wireless sensor networks ACM Trans Sens Netw (TOSN) 2.1 2006 65 93
-
(2006)
ACM Trans Sens Netw (TOSN)
, pp. 65-93
-
-
Law, Y.1
Doumen, J.2
Hartel, P.3
-
81
-
-
37149033689
-
In: Alex Biryukov (Ed.), New lightweight des variants
-
Springer Berlin Heidelberg
-
G. Leander, C. Paar, A. Poschmann, and K. Schramm In: Alex Biryukov (Ed.), New lightweight DES variants Fast software encryption 2007 Springer Berlin Heidelberg 196 210
-
(2007)
Fast Software Encryption
, pp. 196-210
-
-
Leander, G.1
Paar, C.2
Poschmann, A.3
Schramm, K.4
-
82
-
-
84892185580
-
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA
-
Donggeon Lee, Dong-Chan Kim, Daesung Kwon, and Howon Kim Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA Sensors 14 1 2014 975 994
-
(2014)
Sensors
, vol.14
, Issue.1
, pp. 975-994
-
-
Lee, D.1
Kim, D.-C.2
Kwon, D.3
Kim, H.4
-
84
-
-
77956158657
-
In: Joo-Seok Song, Taekyoung Kwon, Moti Yung (Ed.), mCrypton-A lightweight block cipher for security of low-cost RFID tags and sensors
-
Springer Berlin Heidelberg
-
C. Lim, and T. Korkishko In: Joo-Seok Song, Taekyoung Kwon, Moti Yung (Ed.), mCrypton-A lightweight block cipher for security of low-cost RFID tags and sensors Information security applications 2006 Springer Berlin Heidelberg 243 258
-
(2006)
Information Security Applications
, pp. 243-258
-
-
Lim, C.1
Korkishko, T.2
-
86
-
-
84859165094
-
Cryptanalysis of mcryptona lightweight block cipher for security of RFID tags and sensors
-
H. Mala, M. Dakhilalian, and M. Shakiba Cryptanalysis of mcryptona lightweight block cipher for security of RFID tags and sensors Int J Commun Syst 25 4 2012 415 426 10.1002/dac.1248
-
(2012)
Int J Commun Syst
, vol.25
, Issue.4
, pp. 415-426
-
-
Mala, H.1
Dakhilalian, M.2
Shakiba, M.3
-
87
-
-
84958528399
-
In: Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood (Eds.), Evaluation of software-oriented block ciphers on smartphones
-
Springer International Publishing Berlin
-
Lukas Malina, Vlastimil Clupek, Zdenek Martinasek, Jan Hajny, Kimio Oguchi, and Vaclav Zeman In: Jean Luc Danger, Mourad Debbabi, Jean-Yves Marion, Joaquin Garcia-Alfaro, Nur Zincir Heywood (Eds.), Evaluation of software-oriented block ciphers on smartphones Foundations and practice of security 2014 Springer International Publishing Berlin 353 368
-
(2014)
Foundations and Practice of Security
, pp. 353-368
-
-
Malina, L.1
Clupek, V.2
Martinasek, Z.3
Hajny, J.4
Oguchi, K.5
Zeman, V.6
-
89
-
-
84947904428
-
In: Eli Biham (Ed.), New block encryption algorithm MISTY
-
Springer Berlin Heidelberg
-
M. Matsui In: Eli Biham (Ed.), New block encryption algorithm MISTY. Fast software encryption 1997 Springer Berlin Heidelberg 54 68
-
(1997)
Fast Software Encryption
, pp. 54-68
-
-
Matsui, M.1
-
91
-
-
24144451042
-
In: Alfred Menezes (Ed.), A systematic evaluation of compact hardware implementations for the Rijndael S-box
-
Springer Berlin Heidelberg
-
N. Mentens, L. Batina, B. Preneel, and I. Verbauwhede In: Alfred Menezes (Ed.), A systematic evaluation of compact hardware implementations for the Rijndael S-box Topics in Cryptology-CT-RSA 2005 2005 Springer Berlin Heidelberg 323 333
-
(2005)
Topics in Cryptology-CT-RSA 2005
, pp. 323-333
-
-
Mentens, N.1
Batina, L.2
Preneel, B.3
Verbauwhede, I.4
-
92
-
-
84897638271
-
Analysis and modeling of FPGA implementations of spatial steganography methods
-
B. Mohd, T. Hayajneh, S. Abed, and A. Itradat Analysis and modeling of FPGA implementations of spatial steganography methods J Circuits, Syst Comput 23 2 2014 1 26
-
(2014)
J Circuits, Syst Comput
, vol.23
, Issue.2
, pp. 1-26
-
-
Mohd, B.1
Hayajneh, T.2
Abed, S.3
Itradat, A.4
-
95
-
-
79958010336
-
In: Kenneth G. Paterson (Ed.),Pushing the limits: A very compact and a threshold implementation of AES
-
Springer Berlin Heidelberg
-
A. Moradi, A. Poschmann, S. Ling, C. Paar, and H. Wang In: Kenneth G. Paterson (Ed.),Pushing the limits: a very compact and a threshold implementation of AES Advances in cryptology-EUROCRYPT 2011 2011 Springer Berlin Heidelberg 69 88
-
(2011)
Advances in Cryptology-EUROCRYPT 2011
, pp. 69-88
-
-
Moradi, A.1
Poschmann, A.2
Ling, S.3
Paar, C.4
Wang, H.5
-
96
-
-
15744395962
-
-
Computer Laboratory, University of Cambridge Technical Report
-
R.M. Needham, and D.J. Wheeler Tea extensions 1997 Computer Laboratory, University of Cambridge Technical Report
-
(1997)
Tea Extensions
-
-
Needham, R.M.1
Wheeler, D.J.2
-
97
-
-
84881220484
-
Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves
-
A. Piedra, A. Braeken, and A. Touhafi Extending the IEEE 802.15.4 security suite with a compact implementation of the NIST P-192/B-163 elliptic curves Sensors 13 8 2013 9704 9728
-
(2013)
Sensors
, vol.13
, Issue.8
, pp. 9704-9728
-
-
Piedra, A.1
Braeken, A.2
Touhafi, A.3
-
101
-
-
84859078042
-
A survey on futuristic health care system: WBANs
-
G.K. Ragesh, and K. Baskaran A survey on futuristic health care system: WBANs Procedia Eng 30 2012 889 896
-
(2012)
Procedia Eng
, vol.30
, pp. 889-896
-
-
Ragesh, G.K.1
Baskaran, K.2
-
102
-
-
0001826463
-
In: Bart Preneel (Ed.), the RC5 encryption algorithm
-
Springer Berlin Heidelberg
-
R. Rivest In: Bart Preneel (Ed.), The RC5 encryption algorithm Fast software encryption 1995 Springer Berlin Heidelberg 86 96
-
(1995)
Fast Software Encryption
, pp. 86-96
-
-
Rivest, R.1
-
104
-
-
84943766242
-
The security of DESX
-
Phillip Rogaway The security of DESX CryptoBytes 2 1996 150
-
(1996)
CryptoBytes
, vol.2
, pp. 150
-
-
Rogaway, P.1
-
105
-
-
52949134853
-
Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents
-
Grimaud Gilles, Standaert François-Xavier, Springer Berlin Heidelberg
-
Carsten Rolfes, Poschmann Axel, Leander Gregor, and Paar Christof Ultra-lightweight implementations for smart devices-security for 1000 gate equivalents Grimaud Gilles, Standaert François-Xavier, Smart Card Research and Advanced Applications 2008 Springer Berlin Heidelberg 89 103
-
(2008)
Smart Card Research and Advanced Applications
, pp. 89-103
-
-
Rolfes, C.1
Axel, P.2
Gregor, L.3
Christof, P.4
-
106
-
-
79952089663
-
A study of IEEE 802.15.4 security framework for wireless body area networks
-
S. Saleem, S. Ullah, and K.S. Kwak A study of IEEE 802.15.4 security framework for wireless body area networks Sensors 11 2 2011 1383 1395
-
(2011)
Sensors
, vol.11
, Issue.2
, pp. 1383-1395
-
-
Saleem, S.1
Ullah, S.2
Kwak, K.S.3
-
107
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (Blowfish)
-
Springer Berlin Heidelberg
-
Bruce Schneier Description of a new variable-length key, 64-bit block cipher (Blowfish) Fast Software Encryption 1994 Springer Berlin Heidelberg
-
(1994)
Fast Software Encryption
-
-
Schneier, B.1
-
109
-
-
84943751866
-
-
Schneier Bruce, Kelsey John, Whiting Doug, Wagner David, Hall Chris, Ferguson Niels. Twofish: A 128-bit block cipher NIST AES Proposal. 15; 1998.
-
(1998)
Twofish: A 128-bit Block Cipher NIST AES Proposal
, vol.15
-
-
Bruce, S.1
John, K.2
Doug, W.3
David, W.4
Chris, H.5
Niels, F.6
-
110
-
-
84856212536
-
A lightweight security scheme for wireless body area networks: Design, energy evaluation and proposed microprocessor design
-
G. Selimis, L. Huang, F. Massé, and et al. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design J Med Syst 35 5 2011 1289 1298
-
(2011)
J Med Syst
, vol.35
, Issue.5
, pp. 1289-1298
-
-
Selimis, G.1
Huang, L.2
Massé, F.3
-
111
-
-
80053524244
-
Piccolo: An ultra-lightweight blockcipher
-
Springer Berlin Heidelberg
-
K. Shibutani, T. Isobe, H. Hiwatari, A. Mitsuda, T. Akishita, and T. Shirai Piccolo: an ultra-lightweight blockcipher Cryptographic hardware and embedded systems-CHES 2011 2011 Springer Berlin Heidelberg 342 357
-
(2011)
Cryptographic Hardware and Embedded Systems-CHES 2011
, pp. 342-357
-
-
Shibutani, K.1
Isobe, T.2
Hiwatari, H.3
Mitsuda, A.4
Akishita, T.5
Shirai, T.6
-
112
-
-
38149123507
-
The 128-bit blockcipher CLEFIA
-
Springer Berlin Heidelberg
-
T. Shirai, K. Shibutani, T. Akishita, S. Moriai, and T. Iwata The 128-bit blockcipher CLEFIA Fast software encryption 2007 Springer Berlin Heidelberg 181 195
-
(2007)
Fast Software Encryption
, pp. 181-195
-
-
Shirai, T.1
Shibutani, K.2
Akishita, T.3
Moriai, S.4
Iwata, T.5
-
115
-
-
35048901993
-
In: Bimal Roy, Willi Meier (Eds.), ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware
-
Springer Berlin Heidelberg
-
F.-X. Standaert, G. Piret, G. Rouvroy, J.-J. Quisquater, and J.-D. Legat In: Bimal Roy, Willi Meier (Eds.), ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware Fast software encryption 2004 Springer Berlin Heidelberg 279 298
-
(2004)
Fast Software Encryption
, pp. 279-298
-
-
Standaert, F.-X.1
Piret, G.2
Rouvroy, G.3
Quisquater, J.-J.4
Legat, J.-D.5
-
118
-
-
84943776511
-
-
IEEE 1, 0
-
Tehranipoor M, Koushanfar F. A Survey of Hardware Trojan Taxonomy and Detection, Design & Test, IEEE, vol.PP, no.99, pp.1,1, 0, doi:10.1109/MDT.2009.159
-
A Survey of Hardware Trojan Taxonomy and Detection, Design & Test
, vol.PP
, Issue.99
, pp. 1
-
-
Tehranipoor, M.1
Koushanfar, F.2
-
119
-
-
33750697230
-
In:: Louis Goubin, Mitsuru Matsui (Eds.), Instruction set extensions for efficient AES implementation on 32-bit processors
-
Springer Berlin Heidelberg
-
Stefan Tillich, and Johann Großschädl In:: Louis Goubin, Mitsuru Matsui (Eds.), Instruction set extensions for efficient AES implementation on 32-bit processors Cryptographic Hardware and Embedded Systems-CHES 2006 2006 Springer Berlin Heidelberg 270 284
-
(2006)
Cryptographic Hardware and Embedded Systems-CHES 2006
, pp. 270-284
-
-
Tillich, S.1
Großschädl, J.2
-
120
-
-
43149083297
-
In: Tal Malkin (Ed.), Boosting AES performance on a tiny processor core
-
Springer Berlin Heidelberg
-
Stefan Tillich, and Christoph Herbst In: Tal Malkin (Ed.), Boosting AES performance on a tiny processor core Topics in Cryptology-CT-RSA 2008 2008 Springer Berlin Heidelberg 170 186
-
(2008)
Topics in Cryptology-CT-RSA 2008
, pp. 170-186
-
-
Tillich, S.1
Herbst, C.2
-
121
-
-
84876796310
-
U-healthcare system: State-of-The-Art review and challenges
-
F. Touati, and R. Tabish U-healthcare system: state-of-the-art review and challenges J Med Syst 37 3 2013 1 20
-
(2013)
J Med Syst
, vol.37
, Issue.3
, pp. 1-20
-
-
Touati, F.1
Tabish, R.2
-
122
-
-
84878305255
-
A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications
-
Article ID 950704, 12 pages
-
Sana Ullah, Manar Mohaisen, and Mohammed A. Alnuem A Review of IEEE 802.15.6 MAC, PHY, and Security Specifications Int J Distrib Sens Netw 2013 2013 10.1155/2013/950704 Article ID 950704, 12 pages
-
(2013)
Int J Distrib Sens Netw
, vol.2013
-
-
Ullah, S.1
Mohaisen, M.2
Alnuem, M.A.3
-
123
-
-
84944912705
-
ASIC cryptographical processor based on des
-
Verbauwhede Ingrid, et al. ASIC cryptographical processor based on DES. IEEE. Euro ASIC'91;1991.
-
(1991)
IEEE. Euro ASIC'91
-
-
Ingrid, V.1
-
124
-
-
84943754263
-
In: Jean-Jacques Quisquater, Bruce Schneier (Eds.), the performance of modern block ciphers in Java
-
Springer Berlin Heidelberg
-
R.üdiger Weis, and Stefan Lucks In: Jean-Jacques Quisquater, Bruce Schneier (Eds.), The performance of modern block ciphers in java Smart card research and applications 2000 Springer Berlin Heidelberg
-
(2000)
Smart Card Research and Applications
-
-
Weis, R.U.1
Lucks, S.2
-
126
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
Springer Berlin Heidelberg
-
D.J. Wheeler, and R.M. Needham TEA, a tiny encryption algorithm Fast software encryption 1995 Springer Berlin Heidelberg 363 366
-
(1995)
Fast Software Encryption
, pp. 363-366
-
-
Wheeler, D.J.1
Needham, R.M.2
-
127
-
-
84999466301
-
Security on FPGAs: State-of-The-Art implementations and attacks
-
Thomas Wollinger, Jorge Guajardo, and Christof Paar Security on FPGAs: state-of-the-art implementations and attacks ACM Trans Embed Comput Syst 3 3 2004 534 574
-
(2004)
ACM Trans Embed Comput Syst
, vol.3
, Issue.3
, pp. 534-574
-
-
Wollinger, T.1
Guajardo, J.2
Paar, C.3
-
130
-
-
79959309808
-
LBlock: A lightweight block cipher
-
Springer Berlin Heidelberg
-
W. Wu, and L. Zhang LBlock: a lightweight block cipher Applied cryptography and network security 2011 Springer Berlin Heidelberg 327 344
-
(2011)
Applied Cryptography and Network Security
, pp. 327-344
-
-
Wu, W.1
Zhang, L.2
-
131
-
-
84943737440
-
-
Xilinx Inc.
-
Xilinx Inc., [online], (http://www.xilinx.com/fpga/).
-
-
-
-
133
-
-
84872106855
-
A batteryless 19 W MICS/ISM-band energy harvesting body sensor node soc for EXG applications
-
Z. Yanqing, F. Zhang, Y. Shakhsheer, J.D. Silver, A. Klinefelter, M. Nagaraju, J. Boley, and et al. A batteryless 19 W MICS/ISM-band energy harvesting body sensor node soc for EXG applications IEEE J Solid-State Circuits 48 1 2013 199 213
-
(2013)
IEEE J Solid-State Circuits
, vol.48
, Issue.1
, pp. 199-213
-
-
Yanqing, Z.1
Zhang, F.2
Shakhsheer, Y.3
Silver, J.D.4
Klinefelter, A.5
Nagaraju, M.6
Boley, J.7
-
134
-
-
84868130466
-
A review on body area networks security for healthcare
-
Guang He Zhang, Carmen Chung Yan Poon, and Yuan Ting Zhang A review on body area networks security for healthcare ISRN Commun Netw 2011 2011 21
-
(2011)
ISRN Commun Netw
, vol.2011
, pp. 21
-
-
Zhang, G.H.1
Poon, C.C.Y.2
Zhang, Y.T.3
-
135
-
-
84876480614
-
FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks
-
18.2
-
Xueying Zhang, Howard M. Heys, and Cheng Li FPGA implementation and energy cost analysis of two light-weight involutional block ciphers targeted to wireless sensor networks Mob Netw Appl 18.2 2013 222 234
-
(2013)
Mob Netw Appl
, pp. 222-234
-
-
Zhang, X.1
Heys, H.M.2
Li, C.3
-
136
-
-
84870926798
-
ECG-cryptography and authentication in body area networks
-
Z. Zhang, H. Wang, A. Vasilakos, and H. Fang ECG-cryptography and authentication in body area networks IEEE Trans Inf Technol Biomed 16 6 2012 1070 1078
-
(2012)
IEEE Trans Inf Technol Biomed
, vol.16
, Issue.6
, pp. 1070-1078
-
-
Zhang, Z.1
Wang, H.2
Vasilakos, A.3
Fang, H.4
-
137
-
-
84906094456
-
A lightweight encryption scheme for network-coded mobile ad hoc networks
-
1, 0
-
Zhang P, Lin C, Jiang Y, Fan Y, Shen X. A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE Transactions Parallel Distrib Syst, vol. 99, pp.1,1, 0. doi:10.1109/TPDS.2013.161.
-
IEEE Transactions Parallel Distrib Syst
, vol.99
, pp. 1
-
-
Zhang, P.1
Lin, C.2
Jiang, Y.3
Fan, Y.4
Shen, X.5
-
138
-
-
84884572913
-
Securing m-healthcare social networks: Challenges, countermeasures and future directions
-
J. Zhou, Z. Cao, X. Dong, X. Lin, and A.V. Vasilakos Securing m-healthcare social networks: Challenges, countermeasures and future directions IEEE Wirel Commun 20 4 2013 12 21
-
(2013)
IEEE Wirel Commun
, vol.20
, Issue.4
, pp. 12-21
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
Vasilakos, A.V.5
|