-
Notifications
You must be signed in to change notification settings - Fork 0
/
bib.bib
102 lines (102 loc) · 3.28 KB
/
bib.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
@article{beaulieu2015simon,
title={SIMON and SPECK: Block Ciphers for the Internet of Things.},
author={Beaulieu, Ray and Shors, Douglas and Smith, Jason and Treatman-Clark, Stefan and Weeks, Bryan and Wingers, Louis},
journal={IACR Cryptology ePrint Archive},
volume={2015},
pages={585},
year={2015}
}
@book{hansmann2013pervasive,
title={Pervasive computing handbook},
author={Hansmann, Uwe and Merk, Lothar and Nicklous, Martin S and Stober, Thomas},
year={2013},
publisher={Springer Science \& Business Media}
}
@article{satyanarayanan2001pervasive,
title={Pervasive computing: Vision and challenges},
author={Satyanarayanan, Mahadev and others},
journal={IEEE Personal communications},
volume={8},
number={4},
pages={10--17},
year={2001}
}
@inproceedings{weinmann2009axr,
title={Axr-crypto made from modular additions, xors and word rotations},
author={Weinmann, RP},
booktitle={Dagstuhl seminar},
volume={9031},
pages={30},
year={2009}
}
@article{perrig2004security,
title={Security in wireless sensor networks},
author={Perrig, Adrian and Stankovic, John and Wagner, David},
journal={Communications of the ACM},
volume={47},
number={6},
pages={53--57},
year={2004}
}
@inproceedings{khovratovich2010rotational,
title={Rotational cryptanalysis of ARX},
author={Khovratovich, Dmitry and Nikoli{\'c}, Ivica},
booktitle={International Workshop on Fast Software Encryption},
pages={333--346},
year={2010},
organization={Springer}
}
@article{mouha2011arx,
title={ARX-based cryptography},
author={Mouha, Nicky},
journal={Online: https://www.cosic.esat.kuleuven.be/ecrypt/courses/albena11 /slides/nicky\_mouha\_arx-slides.pdf},
year={2011}
}
@article{akyildiz2002wireless,
title={Wireless sensor networks: a survey},
author={Akyildiz, Ian F and Su, Weilian and Sankarasubramaniam, Yogesh and Cayirci, Erdal},
journal={Computer networks},
volume={38},
number={4},
pages={393--422},
year={2002},
publisher={Elsevier}
}
@inproceedings{bonneau2006cache,
title={Cache-collision timing attacks against AES},
author={Bonneau, Joseph and Mironov, Ilya},
booktitle={International Workshop on Cryptographic Hardware and Embedded Systems},
pages={201--215},
year={2006},
organization={Springer}
}
@book{stinson2005cryptography,
title={Cryptography: theory and practice},
author={Stinson, Douglas R},
year={2005},
publisher={Chapman and Hall/CRC}
}
@inproceedings{beaulieu2015simon2,
title={The SIMON and SPECK lightweight block ciphers},
author={Beaulieu, Ray and Treatman-Clark, Stefan and Shors, Douglas and Weeks, Bryan and Smith, Jason and Wingers, Louis},
booktitle={2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)},
pages={1--6},
year={2015},
organization={IEEE}
}
@inproceedings{bernstein2008chacha,
title={ChaCha, a variant of Salsa20},
author={Bernstein, Daniel J},
booktitle={Workshop Record of SASC},
volume={8},
pages={3--5},
year={2008}
}
@incollection{bernstein2008salsa20,
title={The Salsa20 family of stream ciphers},
author={Bernstein, Daniel J},
booktitle={New stream cipher designs},
pages={84--97},
year={2008},
publisher={Springer}
}