최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of information and communication convergence engineering, v.14 no.3, 2016년, pp.177 - 183
Park, Taehwan (Department of Computer Engineering, Pusan National University) , Seo, Hwajeong (Department of Computer Engineering, Pusan National University) , Bae, Bongjin (Department of Computer Engineering, Pusan National University) , Kim, Howon (Department of Computer Engineering, Pusan National University)
A lot of Internet of Things devices has resource-restricted environment, so it is difficult to implement the existing block ciphers such as AES, PRESENT. By this reason, there are lightweight block ciphers, such as SIMON, SPECK, and Simeck, support various block/key sizes. These lightweight block ci...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "The SIMON and SPECK lightweight block ciphers," in Proceedings of the 52nd Annual Design Automation Conference, San Francisco, CA, 2015.
G. Yang, B. Zhu, V. Suder, M. D. Aagaard, and G. Gong, "The Simeck family of lightweight block ciphers," in International Workshop on Cryptographic Hardware and Embedded Systems. Heidelberg: Springer, pp. 307-329, 2015.
S. Kolbl and A. Roy, "A brief comparison of SIMON and SIMECK," 2015 [Internet]. Available: http://eprint.iacr.org/2015/706.pdf.
N. Bagheri, "Linear cryptanalysis of reduced-round SIMECK variants" in Proceedings of 16th International Conference in Cryptology in India, Bangalore, India, pp. 140-152, 2015.
K. Qiao, L. Hu, and S. Sun, "Differential analysis on simeck and simon with dynamic key-guessing techniques," 2015 [Internet]. Available: https://eprint.iacr.org/2015/902.pdf.
K. Zhang, J. Guan, B. Hu, and D. Lin, "Security evaluation on simeck against zero correlation linear cryptanalysis," 2015 [Internet]. Available: https://eprint.iacr.org/2015/911.pdf.
M. Yoshikawa, Y. Nozaki, and K. Asahi, "Multiple rounds aware power analysis attack for a lightweight cipher SIMECK," in Proceedings of 2016 IEEE 2nd International Conference on Big Data Computing Service and Applications (BigDataService), Oxford, UK, pp. 252-256, 2016.
L. Qin, H. Chen, and X. Wang, "Linear hull attack on round-reduced Simeck with dynamic key-guessing techniques," 2016 [Internet]. Available: https://eprint.iacr.org/2016/066.pdf.
Z. Liu, H. Seo, S. S. Roy, J. Großschadl, and H. Kim, and I. Verbauwhede, "Efficient ring-LWE encryption on 8-bit AVR processors," in Proceedings of 17th International Workshop on Cryptographic Hardware and Embedded Systems, Saint-Malo, France, pp. 663-682, 2015.
J. Buchmann, F. Gopfert, T. Guneysu, T. Oder, and T. Poppelmann, "High-performance and lightweight lattice-based public-key encryption," in Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, Xian, China, pp. 2-9, 2016.
T. Poppelmann, T. Oder, and T. Guneysu, "Speed records for ideal lattice-based cryptography on AVR," 2015 [Internet]. Available: http://eprint.iacr.org/2015/382/20150428:235531.
D. Dinu, Y. Le Corre, D. Khovratovich, L. Perrin, J. Großschadl, and A. Biryukov, "Triathlon of lightweight block ciphers for the Internet of Things," 2015 [Internet]. Available: https://eprint.iacr.org/2015/209.pdf.
H. Seo, Z. Liu, J. Choi, T. Park, and H. Kim, "Compact Implementations of LEA block cipher for low-end microprocessors," in Proceedings of 16th International Workshop on Information Security Applications, Jeju, Korea, pp. 28-40, 2015.
B. Zhu, "Reference code for Simeck family of block ciphers," 2015 [Internet]. Available: https://github.com/bozhu/Simeck.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.