Analysis and design of stream ciphers
Analysis and design of stream ciphers
A simple unpredictable pseudo random number generator
SIAM Journal on Computing
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
The quadratic sieve factoring algorithm
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
A fast modular-multiplication algorithm based on a higher radix
CRYPTO '89 Proceedings on Advances in cryptology
Elements of information theory
Elements of information theory
A Radix-4 Modular Multiplication Hardware Algorithm for Modular Exponentiation
IEEE Transactions on Computers - Special issue on computer arithmetic
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Low Power Digital CMOS Design
Shift Register Sequences
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
Fast Software Encryption, Cambridge Security Workshop
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
Fast Software Encryption, Cambridge Security Workshop
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
A Bulk Data Encription Algorithm
Fast Software Encryption, Cambridge Security Workshop
167 MHz Radix-4 Floating Point Multiplier
ARITH '95 Proceedings of the 12th Symposium on Computer Arithmetic
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
Entropy of selectively encrypted strings
WISTP'11 Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication
Speaker verification from partially encrypted compressed speech for forensic investigation
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
Secure transmission of multimedia information (e.g., voice, video, data, etc.) is critical in many wireless network applications. Wireless transmission imposes constraints not found in typical wired systems such as low power consumption, tolerance to high bit error rates, and scalability. A variety of low power techniques have been developed to reduce the power of several encryption algorithms. One key idea involves exploiting the variation in computation requirements to dynamically vary the power supply voltage. Application of low power techniques to a wireless camera application yield more than an order of magnitude reduction in power consumption over conventional design methods. Test circuits for five algorithms have been fabricated in a 0.6 um process and the resulting power consumption of each is presented. In addition, a low power hybrid system that combines a power-efficient keystream generator with a secure pseudo-random seed generator is proposed that provides 1 Mbps data encryption at a total estimated power consumption of 150 uW.