1 |
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, 'Strong authentication for RFID systems using the AES algorithm,' In Proc. Workshop on Cryptographic Hardware and Embedded Systems(CHES2004), pp. 357-370, Aug. 2004
|
2 |
G. Rouvroy, F.-X. Standaert, J.-J. Quisquater, and J.-D. Legat, 'Compact and efficient encryption/decryption module for FPGA implementation of the AES Rijndael very well suited for small embedded applications,' In Proc. International Conference on Information Technology : Coding and Computing (ITCC'04), pp. 583-587, April 2004
DOI
|
3 |
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, and Seongtaek Chee, 'HIGHT: A New Block Cipher Suitable for Low-Resource Device,' In Proc. Workshop on Cryptographic Hardware and Embedded Systems(CHES2006), pp. 46-59, Oct. 2006
|
4 |
G. Gaubatz, J.-P. Kaps, and B. Sunnar, 'Public key cryptography in sensor networks-revisited,' In Proc. Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), vol. 3313, Aug. 2004
|
5 |
G. Gaubatz, J.-P. Kaps, E. Ozturk, and B. Sunar, 'State of the art in ultra-low power public key cryptography for wireless sensor networks,' In Proc. on Pervasive Computing and Communications Workshops, pp. 146-150, March 2005
DOI
|
6 |
M. Feldhofer, J. Wolkerstorfer, and V. Rijmen, 'AES implementation on a grain of sand,' In Proc. Information Security, vol. 152, issue 1, pp. 13-20, Oct. 2005
|
7 |
NIST FIPS PUB 46 : Data Encryption Standard, January, 1977
|
8 |
K. Finkenzeller, RFID-Handbook, 2nd Edition, April 2003
|