{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T09:45:04Z","timestamp":1774691104592,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540310129","type":"print"},{"value":"9783540331537","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11604938_19","type":"book-chapter","created":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T10:28:58Z","timestamp":1138789738000},"page":"243-258","source":"Crossref","is-referenced-by-count":142,"title":["mCrypton \u2013 A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors"],"prefix":"10.1007","author":[{"given":"Chae Hoon","family":"Lim","sequence":"first","affiliation":[]},{"given":"Tymur","family":"Korkishko","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Bono, S., Green, M., Stubblefield, A., Juels, A., Rubin, A., Szydlo, M.: Security analysis of a cryptographically-enabled RFID device. In: 14th USENIX Security Symposium, Baltimore, Maryland (July-August 2005)"},{"key":"19_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-36532-X_1","volume-title":"Software Security \u2013 Theories and Systems","author":"R.H. Campbell","year":"2003","unstructured":"Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards Security and Privacy for Pervasive Computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 1\u201315. Springer, Heidelberg (2003)"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/978-3-540-28632-5_26","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"M. Feldhofer","year":"2004","unstructured":"Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 357\u2013370. Springer, Heidelberg (2004)"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"Garfinkel, S.L., Jeuls, A., Pappu, R.: RFID privacy: An overview of problems and proposed solutions. IEEE Security & Privacy, 34\u201343 (May\/June 2005)","DOI":"10.1109\/MSP.2005.78"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastary, N., Wagner, D.: TinySec: A link layer security architecture for wireless sensor networks. In: ACM SenSys 2004, November 3-5 (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"19_CR6","unstructured":"Law, Y.W., Doumen, J.M., Hartel, P.H.: Benchmarking block ciphers for wireless sensor networks (Extended abstract). In: 1st IEEE Int. Conf. on Mobile Ad-hoc and Sensor Systems (MASS), Fort Lauderdale, Florida (October 2004)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/3-540-48519-8_3","volume-title":"Fast Software Encryption","author":"C.H. Lim","year":"1999","unstructured":"Lim, C.H.: A revised version of CRYPTON: CRYPTON v1.0. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol.\u00a01636, pp. 31\u201345. Springer, Heidelberg (1999)"},{"key":"19_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/3-540-36400-5_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2002","author":"S. Morioka","year":"2003","unstructured":"Morioka, S., Satoh, A.: An Optimized S-Box Circuit Architecture for Low Power AES Design. In: Kaliski Jr., B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol.\u00a02523, pp. 172\u2013186. Springer, Heidelberg (2003)"},{"issue":"5","key":"19_CR9","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/990680.990707","volume":"47","author":"A. Perrig","year":"2004","unstructured":"Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. of ACM\u00a047(5), 53\u201357 (2004)","journal-title":"Commun. of ACM"},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Polastre, J., Szewczyk, R., Culler, D.: Telos: enabling ultra-low power wireless research. In: Proceedings of the 4th Int. Conf. on Information Processing in Sensor Networks: Special track on Platform Tools and Design Methods for Network Embedded Sensors (IPSN\/SPOTS), April 25-27 (2005)","DOI":"10.1109\/IPSN.2005.1440950"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ubiquitous Computing. IEEE Security & Privacy, 22\u201326 (April 2002)","DOI":"10.1109\/MC.2002.1012427"},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-540-39881-3_18","volume-title":"Security in Pervasive Computing","author":"S.A. Weis","year":"2004","unstructured":"Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 454\u2013469. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Security Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11604938_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:04:56Z","timestamp":1619507096000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11604938_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540310129","9783540331537"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11604938_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}