Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 402-407.
Previous Articles Next Articles
LUO Xin-qiang, QI Yue, WAN Ya-dong and WANG Qin
[1] LAN/MAN Standards Committee.Part 15.4:wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs)[S].IEEE Computer Society,2007 [2] An ISA Standard Wireless systems for Industrial automation[C]∥Process Control and Related Applications.ISA Std.ISA-100.11a-2009,2009 [3] 莫路锋,毛方杰,等.基于感知数据的无线传感网被动诊断方法[J].北京邮电大学学报,2013,36(1):101-104 [4] 王涛春,秦小麟,等.两层无线传感器网络中隐私保护的范围查询[J].北京邮电大学学报,2014,37(2):104-108 [5] 周才学.基于证书的签名方案的分析与改进[J].北京邮电大学学报,2013,36(6):98-101 [6] Daemen J,Rijmen V.AES proposal:Rijndael[C]∥First Advanced Encryption Standard(AES) Conference.1998 [7] Schaumont P R,Kuo H,Verbauwhede I M.Unlocking the design secrets of a 2.29 Gb/s Rijndael processor[C]∥Proceedings 39th Design Automation Conference,2002.IEEE,2002:634-639 [8] Rahimunnisa K,Karthigaikumar P,Kirubavathy J,et al.A 0.13-μm implementation of 5 Gb/s and 3-mW folded parallel architecture for AES algorithm[J].International Journal of Electronics,2013(ahead-of-print):1-12 [9] Morioka S,Satoh A.A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture[J].IEEE Transactions on VLSI Systems,2004,12(7):686-691 [10] Chang J K T,Liu C,Gaudiot J L.Hardware Acceleration for Cryptography Algorithms by Hotspot Detection[M]∥Grid and Pervasive Computing.Springer Berlin Heidelberg,2013:472-481 [11] Nguyen K,Lanante L,Nagao Y,et al.Implementation of 2.6Gbps super-high speed AES-CCM security protocol for IEEE 802.11i[C]∥2013 13th International Symposium on Communications and Information Technologies(ISCIT).IEEE,2013:669-673 [12] Xu Leslie.Secure the Enterprise with Intel? AES-NI:White Paper.http://www.intel.cn/content/www/cn/zh/ enterprise-security/enterprise-security-aes-ni-white-paper.html [13] Lee R B,Chen Y Y.Processor accelerator for AES[C]∥2010 IEEE 8th Symposium on Application Specific Processors(SASP).IEEE,2010:16-21 [14] Daemen J,Rijmen V.Resistance against implementation at-tacks:A comparative study of the AES proposals[C]∥The Second AES Candidate Conference.1999:122-132 [15] Yumbul K,Sava, E,Kocaba, ,et al.Design and implementation of a versatile cryptographic unit for risc processors[J].Security and Communication Networks,2014,7(1):36-52 [16] Bertoni G,Breveglieri L,Fragneto P,et al.Efficient software implementation of AES on 32-bit platforms[M]∥Cryptographic Hardware and Embedded Systems-CHES 2002.Springer Berlin Heidelberg,2003:159-171 [17] Gladman B.A Specification for Rijndael,the AES Algorithm.http://fp.gladman.plus.com,May 2002 [18] Atasu K,Breveglieri L,Macchetti M.Efficient AES implementations for ARM based platforms[C]∥Proceedings of the 2004 ACM symposium on Applied computing.ACM,2004:841-845 [19] Liu B,Baas B M.Parallel AES encryption engines for many-core processor arrays[J].IEEE Transactions on Computers,2013,62(3):536-547 [20] Viega J,Messier M,Chandra P.Network Security with OpenSSL:Cryptography for Secure Communications [M].O’Reilly Media,Inc.,2002 [21] Bernstein D J.Cache-timing attacks on AES.2005.http://cr.yp.to/papers.html\#cachetiming [22] Bonneau J,Mironov I.Cache-collision timing attacks againstAES[M]∥Cryptographic Hardware and Embedded Systems-CHES 2006.Springer Berlin Heidelberg,2006:201-215 [23] Aclimez O,Schindler W,Ko K.Cache based remote timing attack on the AES[M]∥Topics in Cryptology-CT-RSA 2007.Springer Berlin Heidelberg,2006:271-286 [24] 王韬,赵新杰,郭世泽,等.针对 AES 的 Cache 计时模板攻击研究[J].计算机学报,2012,35(2):325-341 [25] Bertoni G,Zaccaria V,Breveglieri L,et al.AES power attack based on induced cache miss and countermeasure[C]∥International Conference on Information Technology:Coding and Computing,2005(ITCC 2005).IEEE,2005,1:586-591 [26] Aclimez O,Ko K.Trace-driven cache attacks on AES(short paper)[M]∥Information and Communications Security.Sprin-ger Berlin Heidelberg,2006:112-121 [27] Gallais J F,Kizhvatov I,Tunstall M.Improved trace-drivencache-collision attacks against embedded AES implementations[M]∥Information Security Applications.Springer Berlin Heidelberg,2011:243-257 [28] Osvik D A,Shamir A,Tromer E.Cache attacks and countermeasures:the case of AES[M]∥Topics in Cryptology-CT-RSA 2006.Springer Berlin Heidelberg,2006:1-20 [29] Tromer E,Osvik D A,Shamir A.Efficient cache attacks on AES,and countermeasures[J].Journal of Cryptology,2010,23(1):37-71 [30] 赵新杰,王韬,郭世泽,等.AES 访问驱动 Cache 计时攻击[J].软件学报,2011,22(3):572-591 |
No related articles found! |
|