CryptoManiac: a fast flexible architecture for secure communication
ISCA '01 Proceedings of the 28th annual international symposium on Computer architecture
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
GCCW '06 Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops
Public-Key Cryptography for RFID-Tags
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
Multi-gigabit GCM-AES Architecture Optimized for FPGAs
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
International Journal of Applied Cryptography
RFID sensor networks with the Intel WISP
Proceedings of the 6th ACM conference on Embedded network sensor systems
Strong Authentication Protocol for Secure RFID Tag Search without Help of Central Database
EUC '08 Proceedings of the 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing - Volume 02
Celator: A Multi-algorithm Cryptographic Co-processor
RECONFIG '08 Proceedings of the 2008 International Conference on Reconfigurable Computing and FPGAs
A low-resource public-key identification scheme for RFID tags and sensor nodes
Proceedings of the second ACM conference on Wireless network security
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol
Information Security Applications
A lightweight secure architecture for wireless sensor networks
International Journal of Internet Technology and Secured Transactions
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
Algebraic Aspects of the Advanced Encryption Standard
Algebraic Aspects of the Advanced Encryption Standard
A Reconfigurable Multi-core Cryptoprocessor for Multi-channel Communication Systems
IPDPSW '11 Proceedings of the 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and PhD Forum
A new combinational logic minimization technique with applications to cryptology
SEA'10 Proceedings of the 9th international conference on Experimental Algorithms
RFID privacy based on public-key cryptography
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Elliptic curve cryptography on the WISP UHF RFID tag
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
Hi-index | 0.00 |
Extensive development has yielded the improved version of the radio frequency identification RFID called the wireless identification sensing platform WISP. Recent research suggests the combined system of integrated RFID and wireless sensor network WSN used for coupling the virtual and physical world, bridging the gap between WSN and RFID. The possibility of having an integrated WISP sensor network might be a starting point for the new future smart system's application. And yet, in every system there will be sensitive data that requires various degree of data encryption. Given the steep design challenge and the limited resources provided on both WSN and WISP's platforms, we can foresee that the design trend has to be memory and hardware efficient. In this paper, we present a minimalist approach to securely encrypt, authenticate and exchange secret keys with a minimal instruction set computer MISC processor based on the AES algorithm, termed the enhanced AES NAES processor.