References
- B. Latre, B. Braem, I. Moerman, C. Blondia, P. Demeester, "A survey on wireless body area networks," in Proc. of Wireless Networks, vol. 17, no. 1, pp. 1-18, Springer, Heidelberg, 2011. https://doi.org/10.1007/s11276-010-0252-4
- A.J. Menezes, P.C. Van Oorschot, and S.A. Vanstone, Handbook of applied cryptography. CRC Press, 1997.
- A. Perrig, R. Szewczyk, JD. Tygar, V. Wen, DE. Culler, "Spins: security protocols for sensor networks," in Proc. of Wireless Networks, vol. 8, no. 5, pp. 521-534, Springer, Heidelberg, 2002. https://doi.org/10.1023/A:1016598314198
- J. Hoffstein, J. Pipher, J. Silverman, "NTRU: A ring-based public key cryptosystem," in Proc. of Algorithmic Number Theory (ANTS III). LNCS, vol. 1423, pp. 267-288, Springer, Heidelberg, 1998.
- IEEE Std P1363.1-2008, "IEEE standard specification for public key cryptographic techniques based on hard problems over lattices," 2009.
- J. Hoffstein, J. Pipher, J.H. Silverman, "NSS: An NTRU lattice-based signature scheme," in Proc. of Eurocrypt 2001, LNCS, vol. 2045, pp. 211-228, Springer, Heidelberg, 2001.
- F. Hu, Q. Hao, M. Lukowiak, Q. Sun, K. Wilhelm, S. Radziszowski, Y. Wu, "Trustworthy data collection from implantable medical devices via high-speed security implementation based on IEEE 1363," IEEE Transactions on Information Technology in Biomedicine, vol. 14, no. 6, pp. 1397-1404, 2010. https://doi.org/10.1109/TITB.2010.2049204
- F. Hu, K. Wilhelm, M. Schab, M. Lukowiak, S. Radziszowski, Y. Xiao, "NTRU-based sensor network security: a low-power hardware implementation perspective," Security Comm. Networks. vol. 2009, no. 2, pp. 71-81, 2009.
- P. Kocher, J. Jaffe, B. Jun, "Differential power analysis," in Proc. of Crypto 1999, LNCS, vol. 1666, pp. 388-397, Springer, Heidelberg, 1999.
- D. Canright, L. Batina, "A very compact perfectly masked S-Box for AES," in Proc. of ACNS 2008, LNCS, vol. 5037, pp. 446-459, Springer, Heidelberg, 2008.
- H. Kim, S. Hong, J. Lim, "A fast and provably secure higher-order masking of AES S-Box," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 95-107, Springer, Heidelberg, 2011.
- C. Clavier, B. Feix, G. Gagnerot, M. Roussellet, V. Verneuil, "Improved collision-correlation power analysis on first order protected AES," in Proc. of CHES 2011, LNCS, vol. 6917, pp. 49-62, Springer, Heidelberg, 2011.
- A. Moradi, O. Mischke, T. Eisenbarth, "Correlation-enhanced power analysis collision attack," in Proc. of CHES 2010, LNCS, vol. 6225, pp. 125-139, Springer, Heidelberg, 2010.
- M. Lee, J. Song, D. Choi, D. Han, "Countermeasures against the power analysis attack for the NTRU public key cryptosystem," IEICE TRANSACTIONS on Fundamentals of Electronics, vol. E93-A, no. 1, pp. 153-163, 2010. https://doi.org/10.1587/transfun.E93.A.153
- A. Bhargava, M. Zoltowski, "Sensors and wireless communication for medical care," in Proc. of 14th International Workshop on Database and Expert Systems Applications, pp. 956-960, 2003.
- G. Selimis, L. Huang, F. Masse, I. Tsekoura, M. Ashouei, F. Catthoor, J. Huisken, J. Stuyt, G. Dolmans, J. Penders, H. Groot, "A lightweight security scheme for wireless body area networks: design, energy, evaluation and proposed microprocessor design," Journal of Medical Systems, vol. 2011, no. 35, pp. 1289-1298, 2011.
- M. Mana, M. Feham, B. Bensaber, "A light weight protocol to provide location privacy in wireless body area networks," International Journal of Network Security & Its Applications, vol. 3, no. 2, pp. 1-11, 2011.
- P. Xiong, W. Zhang, G. Lu, "Secure neighbor relation in wireless sensor network," in Proc. of 4th International Conference on Wireless Communications, Networking and Mobile Computing, pp. 1-4, IEEE, 2008.
- F. Hu, Q. Hao, M. Lukowiak, "Implantable medical device communication security: pattern vs. signal encryption (position paper)," in Proc. of the 2nd USENIX Conference on Health Security and Privacy, pp. 1-2, USENIX Association, 2011.
- A. Atici, L. Batina, B. Gierlichs, I. Verbauwhede, "Power analysis on NTRU implementations for RFIDs: First results," in Proc. of RFIDSec 2008, pp. 128-139, 2008.
- E. Brier, C. Clavier, F. Olivier, "Correlation power analysis with a leakage model," in Proc. of CHES 2004, LNCS, vol. 3156, pp. 16-29, Springer, Heidelberg, 2004.
- S. Mangard, E. Oswald, T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, Springer, Heidelberg, 2007.
- J. Irwin, D. Page, N.P. Smart, "Instruction stream mutation for non-deterministic processors," in Proc. of IEEE International Conference on Application-Specific Systems, Architectures and Processors, pp. 286-295, IEEE Computer Society, Los Alamitos, 2002.