共 18 条
[1]
Bono S.C., Green M., Stubblefield A., Juels A., Rubin A.D., Szydlo M., Security analysis of a cryptographically-enabled RFID device, SSYM'05: Proceedings of the 14th Conference on USENIX Security Symposium, (2005)
[2]
Schneier B., Kelsey J., Unbalanced Feistel networks and block cipher design, Proceedings of the Third International Workshop on Fast 12 Software Encryption
[3]
Polimon J., Hernandez-Castro J.C., Estevez-Tapiador J.M., Ribagorda A., Automated design of a lightweight block cipher with genetic programming, Int J Know-Based Intell Eng Syst, 12, 1, pp. 3-14, (2008)
[4]
Guajardo J., Skoric B., Tuyls P., Kumar S.S., Bel T., Blom A.H., Schrijen G.J., Anti-counterfeiting, key distribution and key storage in an ambient world via physical unclonable functions, Information Systems Frontiers, 11, 1, pp. 19-41, (2009)
[5]
Shadi Masadeh W.S., End to end keyless self encrypting/decrypting streaming cipher, Information Technology & National Security Conference, (2007)
[6]
Schweitzer D., Boleng J., Designing web labs for teaching security concepts, J Comput Small Coll, 25, 2, pp. 39-45, (2009)
[7]
Brown B., 802.11: The security differences between b and i, IEEE Potentials, 22, pp. 23-27, (2003)
[8]
Nadeem Myj. A., A performance comparison of data encryption algorithms, First International Conference on Information and Communication Technologies, 84, (2005)
[9]
Elkilani W.S., Performance of encryption techniques for real-time video streaming, Networking and Media Convergence, 130, (2009)
[10]
Bleichenbacher D., Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard pkcs1, pp. 1-12, (1998)