[1]JUELS A, WEIS S A. Authenticating pervasive devices with human protocols[C]// Advances in Cryptology-CRYPTO 2005, LNCS 3621. Heidelberg: Springer, 2005: 293-308.
[2]POSCHMANN A Y. Lightweight cryptography: Cryptographic engineering for a pervasive world[M]. Bochum: Ruhr-University Bochum, 2009.
[3]WU W, FAN W, ZHANG L. Research progress of lightweight block cipher[C]// Chinese Cryptology Development Report. Beijing: Publishing House of Electronics Industry,2010:140-159.(吴文玲, 范伟杰, 张蕾. 轻量级分组密码研究进展[C]// 中国密码学发展报告2010. 北京: 电子工业出版社, 2010: 140-159.)
[4]MORADI A, POSCHMANN A, LING S, et al. Pushing the limits: a very compact and a threshold implementation of AES[C]// Proceedings of the 30th Annual International Conference on Theory and Applications of Cryptographic Techniques, LNCS 6632. Berlin: Springer-Verlag, 2011: 69-88.
[5]LEANDER G, PAAR C, POSCHMANN A, et al. New lightweight DES variants[C]// Fast Software Encryption, LNCS 4595. Berlin: Springer-Verlag, 2007: 196-210.
[6]HONG D, SUNG J, HONG S, et al. HIGHT: a new block cipher suitable for low-resource device[C]// Proceedings of the 8th International Conference on Cryptographic Hardware and Embedded Systems, LNCS 4249. Berlin: Springer-Verlag, 2006: 46-59.
[7]STANDAERT F X, PIRET G, GERSHENFELD N, et al. SEA: a scalable encryption algorithm for small embedded applications[C]// Proceedings of the 7th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications, LNCS 3928. Berlin: Springer-Verlag, 2006: 222-236.
[8]BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: an ultra-lightweight block cipher[C]// Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 4727. Berlin: Springer-Verlag, 2007: 450-466.
[9]de CANNIERE C, DUNKELMAN O, KNEZEVIC M. KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers[C]// Proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 5747. Berlin: Springer-Verlag, 2009: 272-288.
[10]IZADI M, SADEGHIVAN B, SADEGHIAN S S, et al. MIBS: a new lightweight block cipher[C]// Proceedings of the 8th International Conference on Cryptology and Network Security, LNCS 5888. Berlin: Springer-Verlag, 2009: 334-348.
[11]WU W, ZHANG L. LBlock: a lightweight block cipher[C]// Applied Cryptography and Network Security, LNCS 6715. Berlin: Springer, 2011: 327-344.
[12]GUO J, PEVRIN T, POSCHMANN A, et al. The LED block cipher[C]// Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer-Verlag, 2011: 326-341.
[13]GONG Z, NIKOVA S, LAW Y W. KLEIN: a new family of lightweight block ciphers[EB/OL]. [2013-10-24]. http://www.metu.edu.tr/~e132713/Klein.pdf.
[14]SHIBUTANI K, ISOBE T, HIWATARI H, et al. Piccolo: an ultra-lightweight blockcipher[C]// Proceedings of the 13th International Conference on Cryptographic Hardware and Embedded Systems, LNCS 6917. Berlin: Springer-Verlag, 2011: 342-357.
[15]HAMALAINEN P, ALHO T, HANNIKAINEN M, et al. Design and implementation of low-area and low-power AES encryption hardware core[C]// Proceedings of the 9th EUROMICRO Conference on Digital System Design. Washington, DC: IEEE Computer Society, 2006: 577-583.
[16]WU H. The stream cipher HC-128[M] . Berlin: Springer-Verlag, 2008: 39-47.
[17]BOESGAARD M, VESTERAGER M, PEDERSEN T, et al. Rabbit: a new high-performance stream cipher[C]// Fast Software Encryption, LNCS 4936. Berlin: Springer, 2003: 307-329.
[18]BERNSTEIN D J. The Salsa20 family of stream ciphers[EB/OL]. [2013-11-02]. http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.64.8844&rep=rep1&type=pdf.
[19]BERBAIN C, BILLET O, CANTEAUT A, et al. Sosemanuk, a fast software-oriented stream cipher[C]// New Stream Cipher Designs, LNCS 4986. Berlin: Springer-Verlag, 2008: 98-118.
[20]HELL M, JOHANSSON T, MEIER W. Grain: a stream cipher for constrained environments[J]. International Journal of Wireless and Mobile Computing, 2007, 2(1): 86-93.
[21]BABBAGE S, DODD M. The stream cipher MICKEY 2.0[EB/OL]. [2013-11-06]. https://www.cosic.esat.kuleuven.be/ ecrypt/stream/p2ciphers/mickey/mickey_p2.pdf.
[22]de CANNIERE C. Trivium: a stream cipher construction inspired by block cipher design principles[C]// Proceedings of the 9th International Conference on Information Security, LNCS 4716. Berlin: Springer-Verlag, 2006: 171-186.
[23]LUO Y, CHAI Q, GONG G, et al. A lightweight stream cipher WG-7 for RFID encryption and authentication[C]// Proceedings of the 2010 IEEE Global Telecommunications Conference. Piscataway: IEEE, 2010: 1-6.
[24]DAVID M, RANASINGHE D C, LARSEN T. A2U2: a stream cipher for printed electronics RFID tags[C]// Proceedings of the 2011 IEEE International Conference on RFID. Piscataway: IEEE, 2011: 176-183.
[25]MANIFAVAS C, HATZIVASILIS G, FVSARAKIS K, et al. Lightweight cryptography for embedded systems - a comparative analysis[EB/OL]. [2013-12-20]. http://fysarakis.com/uploads/2/0/6/3/20637656/SETOP2013-Paper-5b.pdf.
[26]AGREN M, HELL M, JOHANSSON T, et al. Grain-128a: a new version of Grain-128 with optional authentication[J]. International Journal of Wireless and Mobile Computing, 2011, 5(1): 48-59.
[27]EISENBARTH T, KUMAR S. A survey of lightweight-cryptography implementations[J]. IEEE Design and Test of Computers, 2007, 24(6): 522-533.
[28]HOFFSTEIN J, PIPHER J, SILVERMAN J H. NTRU: a ring-based public key cryptosystem[C]// Proceedings of the 3rd International Symposium on Algorithmic Number Theory, LNCS 1423. Berlin: Springer, 1998: 267-288.
[29]SAARINEN M J O. The BlueJay ultra-lightweight hybrid cryptosystem[C]// Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops. Piscataway: IEEE, 2012: 27-32.
[30]BOGDANOV A, LEANDER G, PAAR C, et al. Hash functions and RFID tags: Mind the gap[EB/OL]. [2013-12-23]. http://www.iacr.org/archive/ches2008/51540279/51540279.pdf.
[31]O'NEILL M. Low-cost SHA-1 hash function architecture for RFID tags[C]// Proceedings of the Conference on RFID Security.Malaga: Workshop on RFID Security, 2008: 41-51.
[32]FELDHOFER M, RECHBERGER C. A case against currently used hash functions in RFID protocols[C]// Proceedings of the 2006 International Conference on the Move to Meaningful Internet Systems, LNCS 4277. Berlin: Springer-Verlag, 2006: 372-381.
[33]BERTONI G, DAEMEN J, PEETERS M, et al. On the security of the keyed sponge construction[EB/OL]. [2013-12-20].http://sponge.noekeon.org/SpongeKeyed.pdf.
[34]BERGER T P, D'HAYER J, MARQUET K, et al. The GLUON family: a lightweight Hash function family based on FCSRs[EB/OL]. [2013-12-26]. http://hal-unilim.archives-ouvertes.fr/docs/00/73/87/81/PDF/FCSR-soft.pdf.
[35]AUMASSON J P, HENZEN L, MEIER W, et al. Quark: A lightweight hash[J]. Journal of Cryptology, 2013, 26(2): 313-339.
[36]GUO J, PEYRIN T, POSCHMANN A. The PHOTON family of lightweight hash functions[EB/OL]. [2013-12-26]. http://www.ecrypt.eu.org/hash2011/proceedings/hash2011_04.pdf.
[37]BOGDANOV A, KNEZEVIC M, LEANDER G, et al. SPONGENT: a lightweight hash function[EB/OL]. [2013-12-26]. http://homes.esat.kuleuven.be/~abogdano/papers/spongent_ches11.pdf.
[38]ZHANG L, WU W, WEN Q. Stream ciphers research status and prospect of algebraic attacks[J]. Journal of Communications, 2006, 27(1): 91-98.(张龙, 吴文玲, 温巧燕. 流密码代数攻击的研究现状及其展望[J]. 通信学报, 2006, 27(1): 91-98.)
[39]ARORA A, PRIVANKA, PAL S K. A survey of cryptanalytic attacks on lightweight block ciphers[J]. International Journal of Computer Science and Information Technology and Security, 2012, 2(2): 472-481.
[40]ALIZADEH M, SALLEB M, ZAMANI M, et al. Security and performance evaluation of lightweight cryptographic algorithms in RFID[EB/OL]. [2014-01-02]. http://www.wseas.us/e-library/conferences/2012/Kos/COMCOM/COMCOM-03.pdf.
[41]BAR-EI H. Introduction to side channel attacks[EB/OL]. [2013-11-10]. http://gauss.ececs.uc.edu/Courses/c653/ lectures/ SideC/intro.pdf.
[42]ZHANG L, GU D, GUO Z, et al. Correlation power analysis and implementation on KATAN32 cipher[J]. Journal of Computer Applications, 2011, 31(2): 504-510.(张雷, 谷大武, 郭筝, 等. KATAN32 相关功耗分析及其实现[J]. 计算机应用, 2011, 31(2): 504-510.)
[43]WANG C, ZHAO Z, YU M, et al. Research on correlation power analysis attack against Piccolo[J]. Journal of Harbin Institute of Technology, 2013, 45(9): 17-22.(王晨旭, 赵占锋, 喻明艳, 等. Piccolo 相关性功耗分析攻击技术研究[J]. 哈尔滨工业大学学报, 2013, 45(9): 17-22.)
[44]XUE H, ZHAO X, WANG X. Algebraic side-channel attack on LBlock[J]. Journal of Huazhong University of Science and Technology: Natural Science Edition, 2013, 41(6): 55-60.(薛红, 赵新杰, 王小娟. LBlock 分组密码代数旁路攻击[J]. 华中科技大学学报:自然科学版, 2013, 41(6): 55-60.)
[45]ZHANG F, ZHAO X, GUO S, et al. Improved algebraic fault analysis: a case study on Piccolo and applications to other lightweight block ciphers[EB/OL]. [2014-03-05]. http://www.engr.uconn.edu/~zshi/publications/zhang13_improved_ afa.pdf.
[46]ZHAO X, GUO S, ZHANG F, et al. Improving and evaluating differential fault analysis on LED with algebraic techniques[C]// Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography. Piscataway: IEEE, 2013: 41-51.
[47]JOVANOVIC P, KREUZER M, POLIAN I. An algebraic fault attack on the LED block cipher[EB/OL]. [2014-03-06]. https://eprint.iacr.org/2012/400.pdf.
[48]YANG L, WANG M, QIAO S. Side channel cube attack on PRESENT[C]// Proceedings of the 8th International Conference on Cryptology and Network Security, LNCS 5888. Berlin: Springer-Verlag, 2009: 379-391.
[49]POSCHMANN A, MORADI A, KHOO K, et al. Side-channel resistant crypto for less than 2300GE[J]. Journal of Cryptology, 2011, 24(2): 322-345.
[50]NIKOVA S, RIJMEN V, SCHLAFFER M. Secure hardware implementation of nonlinear functions in the presence of glitches[J]. Journal of Cryptology, 2011, 24(2): 292-321. |