Author:
Joseph Mabin,Sekar Gautham,Balasubramanian R.
Publisher
Springer International Publishing
Reference20 articles.
1. Aagaard, M., Gong, G., Mota, R.K.: Hardware implementations of the WG-5 cipher for passive RFID tags. In: IEEE International Symposium on Hardware-Oriented Security and Trust, Proceedings of HOST 2013, pp. 29–34 (2013). doi:
10.1109/HST.2013.6581561
2. Ding, L., Jin, C., Guan, J., Wang, Q.: Cryptanalysis of lightweight WG-8 stream cipher. IEEE Trans. Inf. Foren. Secur. 9(4), 645–652 (2014). doi:
10.1109/TIFS.2014.2307202
3. Ding, L., Jin, C., Guan, J., Zhang, S., Cui, T., Han, D., Zhao, W.: Cryptanalysis of WG family of stream ciphers. Comput. J. 58(10), 2677–2685 (2015). doi:
10.1093/comjnl/bxv024
4. ECRYPT: The eSTREAM project.
http://www.ecrypt.eu.org/stream
5. Fan, X., Gong, G.: Specification of the stream cipher WG-16 based confidentiality and integrity algorithms. University of Waterloo Technical report, CACR 2013–06 (2013).
http://cacr.uwaterloo.ca/techreports/2013/cacr2013-06.pdf
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献