Energy Comparison of AES and SHA-1 for Ubiquitous Computing
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 372-381
- https://doi.org/10.1007/11807964_38
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- AES on FPGA from the Fastest to the SmallestLecture Notes in Computer Science, 2005
- AES implementation on a grain of sandIEE Proceedings - Information Security, 2005
- TinySecPublished by Association for Computing Machinery (ACM) ,2004
- Benchmarking block ciphers for wireless sensor networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Strong Authentication for RFID Systems Using the AES AlgorithmPublished by Springer Science and Business Media LLC ,2004
- A highly regular and scalable aes hardware architectureIEEE Transactions on Computers, 2003
- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512Lecture Notes in Computer Science, 2002
- SPINS: Security Protocols for Sensor NetworksWireless Networks, 2002
- Vibration-to-electric energy conversionIEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2001
- Self-powered signal processing using vibration-based power generationIEEE Journal of Solid-State Circuits, 1998