최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회지 = Communications of the Korean Institute of Information Scientists and Engineers, v.35 no.1 = no.332, 2017년, pp.8 - 15
서화정 (싱가포르 과학기술청)
초록이 없습니다.
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
H. Seo, J. Choi, H. Kim, T. Park, and H. Kim, "Pseudo random number generator and hash function for embedded microprocessors," In Internet of Things (WF-IoT), 2014 IEEE World Forum on, pp. 37-40, 2014.
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers. "The SIMON and SPECK families of lightweight block ciphers," IACR Cryptology ePrintArchive, 2013.
D. Hong, J. Lee, D. Kim, D. Kwon, K. Ryu, and D. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," In International Workshop on Information Security Applications, pp. 3-27, 2013.
H. Seo, Z. Liu, J. Choi, T. Park, and H. Kim, "Compact Implementations of LEA Block Cipher for Low-End Microprocessors," In International Workshop on Information Security Applications, pp. 28-40, 2015.
D. Kim, D. Hong, J. Lee, W. Kim, and D. Kwon. "LSH: A new fast secure hash function family," In Information Security and Cryptology-ICISC 2014, pp. 286-313, 2014.
T. Park, H. Seo, Z. Liu, J. Choi, and H. Kim, "Compact Implementations of LSH," In International Workshop on Information Security Applications, pp. 41-53, 2015.
J. Balasch, B. Ege, T. Eisenbarth, B. Gerard, Z. Gong, T. Guneysu, S. Heyse, S. Kerckhof, F. Koeune, T. Plos, "Compact implementation and performance evaluation of hash functions in attiny devices," In International Conference on Smart Card Research and Advanced Applications, pp. 158-172, 2013.
Z. Liu, J. GroBschadl, and I. Kizhvatov, "Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers," In: Workshop on the Security of the Internet of Things-SOCIOT, 2010.
N. Gura, A. Patel, A. S. Wander, H. Eberle, and S. Chang Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems, pp. 119-132.2004.
L. Uhsadel, A. Poschmann, and C. Paar, "Enabling full-size public-key algorithms on 8-bit sensor nodes," in Security and Privacy in Ad-hoc and Sensor Networks, pp. 73-86, 2007
M. Scott and P. Szczechowiak, "Optimizing multiprecision multiplication for public key cryptography," Cryptology ePrint Archive, Report 2007/299, 2007.
J. Deng, R. Han, and S. Mishra, "A performance evaluation of intrusion tolerant routing in wireless sensor networks," in Information Processing in Sensor Networks, pp. 349-364, 2003.
R. Watro, D. Kong, SF. Cuti, C. Gardiner, C. Lynn, and P. Kruus, "TinyPK: securing sensor networks with public key technology," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59-64, 2004.
A. S. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communication, pp. 324-328, 2005.
H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors," in Information and Communications Security, pp. 519-528, 2006.
M. Hutter, and S. Peter, "Multiprecision multiplication on AVR revisited." Journal of Cryptographic Engineering, pp. 201-214, 2015.
M. Hutter and E. Wenger, "Fast multi-precision multiplication for public-key cryptography on embedded microprocessors," Cryptographic Hardware and Embedded Systems, pp. 459-474, 2011.
H. Seo and H. Kim, "Multi-precision multiplication for public-key cryptography on embedded microprocessors," Information Security Applications, pp. 55-67, 2012.
H. Seo and H. Kim, "Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors," International Journal of Computer and Communication Engineering, 2013.
D. Bernstein, "Curve25519: new Diffie-Hellman speed records," Public Key Cryptography, pp. 207-228, 2006.
M. Diill, B. Hasse, G. Hinterwalder, M. Hutter, C. Paar, A. Sanchez, and P. Schwabe, "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers," Designs, Codes and Cryptography, 77(2-3), pp. 493-514, 2015.
M. Hutter and P. Schwabe, "NaCl on 8-bit AVR microcontrollers," AFRlCACRYPT 2013, pp. 156-172, 2013.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.