当先锋百科网

首页 1 2 3 4 5 6 7

[1] MURAMATSU J,MIYAKE S.Hash property and fixed-rate universal coding theorems[J].IEEE Information Theory Society,2010,56(6):2688-2698.

[2] SAM L,SAM A,PATRICK V T,et al.Wearable flexible lightweight modular RFID tag with intergrated energy harvester[J].IEEE Transactions on Microwave Theory and Techniques,2016,64(7):2304-2314.

[3] IGNACIO A B,CLAUDIA F U,RENE C,et al.Design and implementation of a non-pipelined MD5 hardware architecture using a new functional description[J].IEICE Transactions on Information and Systems,2008,E91-D(10):2519-2523.

[4] HILARIE O.Recent parables in cryptography[J].IEEE Internet Computing,2014,18(1):82-86.

[5] WILLIAM E B.A new hash competition[J].IEEE Security & Privacy,2008,6(3):60-62.

[6] AUMASSON J P,HENZEN L,MEIER W,et al.Quark:A lightweight hash[J].Journal of Cryptology,2013,26(2):313-339.

[7] DING L,JIN C H,GUAN J.New state recovery attacks on the Grain v1 stream cipher[J].China Communication,2016,13(11):180-188.

[8] CANNIōRE D,DUNKELMAN O,KNEZEVICM.KATAN and KTANTAN:A family of small and efficient hardware-oriented block ciphers[C]//Proceedings of 11th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2009:272-288.

[9] GUO J,PEYRIN T,POSCHMANN A,et al.The PHOTON family of lightweight hash functions[C]//Advances in Cryptology-CRYPTO.Berlin:Springer,2011:222-239.

[10] ISSAM H,KAMAL E S,EZZ E M,et al.High-speed AES encryptor with efficient merging techniques[J].IEEE Embedded Systems Letters,2010,2(3):67-71.

[11] BOGDANOV A,KNEZENIV M,LEANDER G.SPONGENT:The design space of lightweight cryptographic hashing[J].IEEE Transactions on Computers,2013,62(10):2041-2053.

[12] BOGDANOV A,KNEZENIV M,LEANDER G.PRESENT:An ultra lightweight block cipher[C]//Proceedings of 9th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer,2007:450-466.

[13] COLLARD B,STANDAERT F X.A statistical saturation attack against the block cipher PRESENT[C]//The Cryptographers Track at RSA Conference 2009.Berilin:Springer,2009:195-211.

[14] CHARANJIT S J,ANINDYA C P.Provably good codes for Hash function design[J].IEEE Transactions on Information Theory,2009,55(1):33-45.

[15] BERTONI G,DAEMEN J,PEETERS M.Sponge based pseudo-random number generators[C]//Proceedings of 12th International Conference Cryptographic Hardware and Embedded Systems.Berlin:Springer,2010:33-47.

[16] LIM C,KORKISHKO T.MCrypton:A lightweight block cipher for security of low-cost RFID tags and sensors[C]//Information Security Applications:6th International Workshop, WISA 2005.Berlin:Springer,3786:243-258.

[17] LEANDER G,POSCHMANN A.On the classification of 4 bit S-BOX[C]//Arithmetic of Finite Fields:First International Workshop, WAIFI 2007.Berlin:Springer,2007:159-176.