Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Design and implementation of a scalable encryption processor with embedded variable DC/DC converter
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
SPINS: security protocols for sensor networks
Wireless Networks
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Mobile Networks and Applications - Security in mobile computing environments
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Lightweight Security Mechanisms for Wireless Video Transmission
ITCC '01 Proceedings of the International Conference on Information Technology: Coding and Computing
State based key hop protocol: a lightweight security protocol for wireless networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
The boomerang attack on 5 and 6-round reduced AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Negotiation of security services: a multi-criteria decision approach
WESS '09 Proceedings of the 4th Workshop on Embedded Systems Security
Run-time selection of security algorithms for networked devices
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Secure encrypted-data aggregation for wireless sensor networks
Wireless Networks
Security and packets delivery trade-off for WSN
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Energy Measurement and Analysis of Security Algorithms for Embedded Systems
GREENCOM '11 Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications
Measurement-based research on cryptographic algorithms for embedded real-time systems
Journal of Systems Architecture: the EUROMICRO Journal
Hi-index | 0.00 |
Minimizing power consumption is crucial in battery power-limited secure wireless mobile networks. In this paper, we (a) introduce a hardware/software set-up to measure the battery power consumption of encryption algorithms through real-life experimentation, (b) based on the profiled data, propose mathematical models to capture the relationships between power consumption and security, and (c) formulate and solve security maximization subject to power constraints. Numerical results are presented to illustrate the gains that can be achieved in using solutions of the proposed security maximization problems subject to power constraints.