1 |
Common Criteria for Information Technology Security Evaluation [Internet], Available: http://www.commoncriteriaportal.org/cc/.
|
2 |
German Federal Office for Information Security, Common Criteria - Protection Profile Cryptographic Modules, Security Level 'Enhanced'. Bonn: German Federal Office for Information Security, 2008.
|
3 |
National Institute of Standards and Technology, Recommendation for Random Number Generation Using Deterministic Random Bit Generators (SP 800-90A). Gaithersburg, MD: National Institute of Standards and Technology, 2012.
|
4 |
H. Chan and A. Perrig, "PIKE: peer intermediaries for key establishment in sensor networks," in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, pp. 524-535, 2005.
|
5 |
National Institute of Standards and Technology, "Security requirements of cryptographic modules," FIPS 140-3, 2009.
|
6 |
C. Hartung, J. Balasalle, and R. Han, "Node compromise in sensor networks: the need for secure systems," Department of Computer Science, University of Colorado at Boulder, Technical Report CUCS-990-05, 2005.
|
7 |
Ecrypt stream cipher project [Internet], Available: http://www.ecrypt.eu.org/stream/.
|
8 |
European Network of Excellence for Cryptology II (ECRYPT II) [Internet], Available: http://www.ecrypt.eu.org/.
|
9 |
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers, ISO/IEC 18033-4:2011, 2011.
|
10 |
K. Bae, M. Ahn, H. Lee, J. Ha, and S. Moon, "Power analysis attack and countermeasure on the Rabbit Stream Cipher," in Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, Honolulu, HI, pp. 50-56, 2011.
|
11 |
M. Abdalla and M. Bellare, "Increasing the lifetime of a key: a comparative analysis of the security of re-keying techniques," in Advances in Cryptology (ASIACRYPT 2000). Heidelberg: Springer, pp. 546-559, 2000.
|
12 |
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
DOI
ScienceOn
|
13 |
National Institute of Standards and Technology, Recommendation for Key Derivation Using Pseudorandom Functions (SP 800-108). Gaithersburg, MD: National Institute of Standards and Technology, 2009.
|
14 |
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, pp. 41-47, 2002.
|
15 |
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A key management scheme for wireless sensor networks using deployment knowledge," in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, Hong Kong, China, 2004.
|