Author image not provided
 Yi Wang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article0.00
Citation Count0
Publication count1
Publication years2017-2017
Available for download1
Average downloads per article59.00
Downloads (cumulative)59
Downloads (12 Months)59
Downloads (6 Weeks)6
SEARCH
ROLE


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


1 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 1 of 1
Sort by:

1 published by ACM
July 2017 ACM Transactions on Embedded Computing Systems (TECS) - Special Issue on Secure and Fault-Tolerant Embedded Computing and Regular Papers: Volume 16 Issue 4, September 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 59,   Downloads (Overall): 59

Full text available: PDFPDF
Radio-Frequency Identification (RFID) tag-based applications are usually resource constrained and security sensitive. However, only about 2,000 gate equivalents in a tag can be budgeted for implementing security components [27]. This requires not only lightweight cryptographic algorithms such as PRESENT (around 1,000 gate equivalents) but also lightweight protections against modern Side ...
Keywords: DFA-resistant, PRESENT cipher, RFID, lightweight, side channel attacks



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us