{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T11:36:03Z","timestamp":1775302563349,"version":"3.50.1"},"reference-count":109,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2006,2]]},"abstract":"<jats:p>Cryptographic algorithms play an important role in the security architecture of wireless sensor networks (WSNs). Choosing the most storage- and energy-efficient block cipher is essential, due to the facts that these networks are meant to operate without human intervention for a long period of time with little energy supply, and that available storage is scarce on these sensor nodes. However, to our knowledge, no systematic work has been done in this area so far. We construct an evaluation framework in which we first identify the candidates of block ciphers suitable for WSNs, based on existing literature and authoritative recommendations. For evaluating and assessing these candidates, we not only consider the security properties but also the storage- and energy-efficiency of the candidates. Finally, based on the evaluation results, we select the most suitable ciphers for WSNs, namely Skipjack, MISTY1, and Rijndael, depending on the combination of available memory and required security (energy efficiency being implicit). In terms of operation mode, we recommend Output Feedback Mode for pairwise links but Cipher Block Chaining for group communications.<\/jats:p>","DOI":"10.1145\/1138127.1138130","type":"journal-article","created":{"date-parts":[[2006,7,25]],"date-time":"2006-07-25T14:14:26Z","timestamp":1153836866000},"page":"65-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":190,"title":["Survey and benchmark of block ciphers for wireless sensor networks"],"prefix":"10.1145","volume":"2","author":[{"given":"Yee Wei","family":"Law","sequence":"first","affiliation":[{"name":"University of Twente, The Netherlands"}]},{"given":"Jeroen","family":"Doumen","sequence":"additional","affiliation":[{"name":"University of Twente, The Netherlands"}]},{"given":"Pieter","family":"Hartel","sequence":"additional","affiliation":[{"name":"University of Twente, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2006,2]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"3GPP. 1999. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2: KASUMI Specification. ETSI\/SAGE Specification Version: 1.0.]]  3GPP. 1999. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2: KASUMI Specification. ETSI\/SAGE Specification Version: 1.0.]]"},{"key":"e_1_2_2_2_1","volume-title":"Serpent: A Proposal for the Advanced Encryption Standard","author":"Anderson R.","year":"1998"},{"key":"e_1_2_2_3_1","volume-title":"Proceedings of the Selected Areas in Cryptography (SAC'00)","author":"Aoki K.","year":"2012"},{"key":"e_1_2_2_4_1","unstructured":"Aoki K. Ichikawa T. Kanda M. Matsui M. Moriai S. Nakajima J. and Tokita T. 2001a. Specification of Camellia---A 128-Bit Block Cipher. Specification Version 2.0 Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation.]]  Aoki K. Ichikawa T. Kanda M. Matsui M. Moriai S. Nakajima J. and Tokita T. 2001a. Specification of Camellia---A 128-Bit Block Cipher. Specification Version 2.0 Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation.]]"},{"key":"e_1_2_2_5_1","volume-title":"3rd International Conference on Information Security and Cryptology, ICISC","volume":"2015","author":"Babbage S.","year":"2000"},{"key":"e_1_2_2_6_1","volume-title":"Ed. LNCS","volume":"2501","author":"Barkan E."},{"key":"e_1_2_2_7_1","volume-title":"Advances in Cryptology---EUROCRYPT'99: International Conference on the Theory and Application of Cryptographic Techniques. LNCS","volume":"1592","author":"Biham E."},{"key":"e_1_2_2_8_1","volume-title":"LNCS","volume":"1977","author":"Biham E."},{"key":"e_1_2_2_9_1","unstructured":"Biryukov A. 1999. Methods of cryptanalysis. Ph.D. thesis Technion.]]  Biryukov A. 1999. Methods of cryptanalysis. Ph.D. thesis Technion.]]"},{"key":"e_1_2_2_10_1","volume-title":"Advances in Cryptology---EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques. LNCS","volume":"1403","author":"Biryukov A."},{"key":"e_1_2_2_11_1","volume-title":"LNCS","volume":"1807","author":"Biryukov A."},{"key":"e_1_2_2_12_1","volume-title":"6th International Workshop, FSE '99","volume":"1636","author":"Borst J."},{"key":"e_1_2_2_13_1","unstructured":"Burwick C. Coppersmith D. D'Avignon E. Gennaro R. Halevi S. Jutla C. Jr. S. M. M. O'Connor L. Peyravian M. Safford D. and Zunic N. 1999. MARS---a candidate cipher for AES. http:\/\/researchweb.watson.ibm.com\/security\/mars.pdf.]]  Burwick C. Coppersmith D. D'Avignon E. Gennaro R. Halevi S. Jutla C. Jr. S. M. M. O'Connor L. Peyravian M. Safford D. and Zunic N. 1999. MARS---a candidate cipher for AES. http:\/\/researchweb.watson.ibm.com\/security\/mars.pdf.]]"},{"key":"e_1_2_2_14_1","unstructured":"Carman D. Kruus P. and Matt B. 2000. Constraints and approaches for distributed sensor network security. Tech. Rep. &num;00-010 NAI Labs.]]  Carman D. Kruus P. and Matt B. 2000. Constraints and approaches for distributed sensor network security. Tech. Rep. &num;00-010 NAI Labs.]]"},{"key":"e_1_2_2_15_1","volume-title":"4th International Conference on Information Security and Cryptology, ICISC","volume":"2288","author":"Cheon J.","year":"2002"},{"key":"e_1_2_2_16_1","unstructured":"Chien P. and Wen V. 1998. CS199---StrongARM Energy Measurement Report. Online slides: http:\/\/www.cs.berkeley.edu\/~vwen\/strongarm\/slides\/cs199.ppt.]]  Chien P. and Wen V. 1998. CS199---StrongARM Energy Measurement Report. Online slides: http:\/\/www.cs.berkeley.edu\/~vwen\/strongarm\/slides\/cs199.ppt.]]"},{"key":"e_1_2_2_17_1","volume-title":"Re: Impact of Courtois and Pieprzyk results. Forum message at http:\/\/aes.nist.gov\/aes\/.]]","author":"Coppersmith D.","year":"2002"},{"key":"e_1_2_2_18_1","volume-title":"PKC","volume":"2274","author":"Courtois N.","year":"2002"},{"key":"e_1_2_2_19_1","volume-title":"Archive: Report 2003\/022.]]","author":"Courtois N.","year":"2003"},{"key":"e_1_2_2_20_1","volume-title":"Ed. LNCS","volume":"2612","author":"Courtois N."},{"key":"e_1_2_2_21_1","volume-title":"Archive: Report 2002\/044.]]","author":"Courtois N.","year":"2002"},{"key":"e_1_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Courtois N. and Pieprzyk J. 2002b. Cryptanalysis of block ciphers with overdefined systems of equations. In Advances in Cryptology---ASIACRYPT 2002: 8th International Conference on Theory and Application of Cryptology and Information Security Y. Zheng Ed. LNCS vol. 2501. Springer-Verlag 267--287.]]   Courtois N. and Pieprzyk J. 2002b. Cryptanalysis of block ciphers with overdefined systems of equations. In Advances in Cryptology---ASIACRYPT 2002: 8th International Conference on Theory and Application of Cryptology and Information Security Y. Zheng Ed. LNCS vol. 2501. Springer-Verlag 267--287.]]","DOI":"10.1007\/3-540-36178-2_17"},{"key":"e_1_2_2_23_1","unstructured":"CRYPTREC. 2001. Analysis of RC6. {Text are in chinese font} (trans.: Evaluation report of cryptographic algorithms and related technologies) no. 1086.]]  CRYPTREC. 2001. Analysis of RC6. {Text are in chinese font} (trans.: Evaluation report of cryptographic algorithms and related technologies) no. 1086.]]"},{"key":"e_1_2_2_24_1","unstructured":"CRYPTREC. 2003. {Text are in chinese font} (trans.: Specification of e-government-recommended ciphers). http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/cryptrec20030425_spec01%.html.]]  CRYPTREC. 2003. {Text are in chinese font} (trans.: Specification of e-government-recommended ciphers). http:\/\/www.ipa.go.jp\/security\/enc\/CRYPTREC\/fy15\/cryptrec20030425_spec01%.html.]]"},{"key":"e_1_2_2_25_1","volume-title":"4th International Workshop, FSE '97","volume":"1267","author":"Daemen J."},{"key":"e_1_2_2_26_1","unstructured":"Daemen J. and Rijmen V. 1999. AES Proposal: Rijndael.]]  Daemen J. and Rijmen V. 1999. AES Proposal: Rijndael.]]"},{"key":"e_1_2_2_27_1","unstructured":"Dunkelman O. 2002. Comparing MISTY1 and KASUMI. NESSIE Public Report NES\/DOC\/TEC\/WP5\/029\/a Computer Science Department Technion. Dec.]]  Dunkelman O. 2002. Comparing MISTY1 and KASUMI. NESSIE Public Report NES\/DOC\/TEC\/WP5\/029\/a Computer Science Department Technion. Dec.]]"},{"key":"e_1_2_2_28_1","volume-title":"7th International Workshop, FSE","volume":"1978","author":"Ferguson N.","year":"2000"},{"key":"e_1_2_2_29_1","volume-title":"8th Annual International Workshop, SAC","volume":"2259","author":"Ferguson N.","year":"2001"},{"key":"e_1_2_2_31_1","volume-title":"Archive: Report 2002\/111.]]","author":"Fuller J.","year":"2002"},{"key":"e_1_2_2_32_1","volume-title":"7th International Workshop, FSE","volume":"1978","author":"Gilbert H.","year":"2000"},{"key":"e_1_2_2_33_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Gilbert H."},{"key":"e_1_2_2_34_1","volume-title":"2nd AES Candidate Conference (AES2).]]","author":"Hachez G."},{"key":"e_1_2_2_35_1","volume-title":"Selected Areas in Cryptography '98, SAC'98, S. Tavares and H. Meijer, Eds. LNCS","volume":"1556","author":"Handschuh H."},{"key":"e_1_2_2_36_1","volume-title":"SHACAL. In Proceedings of the First Open NESSIE Workshop.]]","author":"Handschuh H."},{"key":"e_1_2_2_37_1","volume-title":"Selected Areas in Cryptography. 9th Annual International Workshop, SAC","volume":"2595","author":"Hatano Y.","year":"2002"},{"key":"e_1_2_2_38_1","volume-title":"Square Attack on Reduced Camellia Cipher. In Information and Communications Security: Third International Conference, ICICS","volume":"2229","author":"He Y.","year":"2001"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/384264.379006"},{"key":"e_1_2_2_40_1","unstructured":"IEEE. 2003. IEEE Standard for Information technology---Telecommunications and information exchange between systems---Local and metropolitan area networks---Specific requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs).]]  IEEE. 2003. IEEE Standard for Information technology---Telecommunications and information exchange between systems---Local and metropolitan area networks---Specific requirements Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low Rate Wireless Personal Area Networks (LR-WPANs).]]"},{"key":"e_1_2_2_41_1","unstructured":"Intel Corporation 1997. Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference. Intel Corporation.]]  Intel Corporation 1997. Intel Architecture Software Developer's Manual Volume 2: Instruction Set Reference. Intel Corporation.]]"},{"key":"e_1_2_2_42_1","volume-title":"Tech. Rep. TR-602, RSA Laboratories. Sept.]]","author":"Kaliski B.","year":"1998"},{"key":"e_1_2_2_43_1","doi-asserted-by":"crossref","unstructured":"Kang J.-S. Shin S.-U. Hong D. and Yi O. 2001a. Provable security of KASUMI and 3GPP encryption mode f8. In Advances in Cryptology---ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security C. Boyd Ed. LNCS vol. 2248. Springer-Verlag 255--271.]]   Kang J.-S. Shin S.-U. Hong D. and Yi O. 2001a. Provable security of KASUMI and 3GPP encryption mode f8. In Advances in Cryptology---ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security C. Boyd Ed. LNCS vol. 2248. Springer-Verlag 255--271.]]","DOI":"10.1007\/3-540-45682-1_16"},{"key":"e_1_2_2_44_1","volume-title":"Proceedings of the 6th Australasian Conference on Information Security and Privacy, ACISP","volume":"2119","author":"Kang J.-S.","year":"2001"},{"key":"e_1_2_2_45_1","volume-title":"SenSys '04: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. ACM Press","author":"Karlof C."},{"key":"e_1_2_2_46_1","first-page":"2","article-title":"Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier's Ad Hoc Networks Journal","volume":"1","author":"Karlof C.","year":"2003","journal-title":"Special Issue on Sensor Network Applications and Protocols"},{"key":"e_1_2_2_47_1","volume-title":"2nd AES Candidate Conference (AES2).]]","author":"Keating G.","year":"1999"},{"key":"e_1_2_2_49_1","volume-title":"LNCS","volume":"1485","author":"Kelsey J."},{"key":"e_1_2_2_50_1","volume-title":"Advances in Cryptology---CRYPTO '96: 16th Annual International Cryptology Conference. Number 1109 in LNCS. Springer-Verlag.]]","author":"Kilian J."},{"key":"e_1_2_2_51_1","volume-title":"International Workshop on Advanced Sensors, Structural Health Monitoring and Smart Structures.]]","author":"Kling R.","year":"2003"},{"key":"e_1_2_2_52_1","volume-title":"7th International Workshop, FSE","volume":"1978","author":"Knudsen L.","year":"2000"},{"key":"e_1_2_2_53_1","volume-title":"9th International Workshop, FSE","volume":"2365","author":"Knudsen L.","year":"2002"},{"key":"e_1_2_2_54_1","volume-title":"LNCS","volume":"2045","author":"K\u00fchn U.","year":"2001"},{"key":"e_1_2_2_55_1","volume-title":"9th International Workshop, FSE","volume":"2365","author":"K\u00fchn U.","year":"2002"},{"key":"e_1_2_2_56_1","volume-title":"4th International Conference on Information Security and Cryptology, ICISC","volume":"2288","author":"Lee S.","year":"2001"},{"key":"e_1_2_2_57_1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/s00145-001-0009-4","article-title":"Selecting cryptographic key sizes","volume":"14","author":"Lenstra A. K.","year":"2001","journal-title":"Journal of Cryptology"},{"key":"e_1_2_2_58_1","volume-title":"Tech. Rep. TR-I2R-v1.1, InfoComm Security Department","author":"Li T.","year":"2005"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1053283.1053287"},{"key":"e_1_2_2_60_1","volume-title":"8th International Workshop, FSE","volume":"2355","author":"Lucks S.","year":"2002"},{"key":"e_1_2_2_61_1","volume-title":"Linear Cryptanalysis of DES. In Advances in Cryptology---EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques. LNCS","volume":"765","author":"Matsui M.","year":"1993"},{"key":"e_1_2_2_62_1","volume-title":"4th International Workshop, FSE '97","volume":"1267","author":"Matsui M.","year":"1997"},{"key":"e_1_2_2_63_1","first-page":"2","article-title":"MISTY, KASUMI and Camellia Cipher Algorithm","volume":"100","author":"Matsui M.","year":"2000","journal-title":"Mitsubishi Electric ADVANCE (Cryptography Edition)"},{"key":"e_1_2_2_64_1","volume-title":"Proceedings of the 2nd AES Conference (AES2).]]","author":"Mirza F."},{"key":"e_1_2_2_65_1","unstructured":"Mitsubishi Electric Corp. 2001. http:\/\/info.isl.ntt.co.jp\/crypt\/camellia\/dl\/camellia.c.]]  Mitsubishi Electric Corp. 2001. http:\/\/info.isl.ntt.co.jp\/crypt\/camellia\/dl\/camellia.c.]]"},{"key":"e_1_2_2_66_1","volume-title":"Ed. LNCS","volume":"2271","author":"Miyaji A."},{"key":"e_1_2_2_67_1","unstructured":"Moh T. 2002. On the Courtois-Pieprzyk's Attack on Rijndael. Web page: http:\/\/www.usdsi.com\/aes.html.]]  Moh T. 2002. On the Courtois-Pieprzyk's Attack on Rijndael. Web page: http:\/\/www.usdsi.com\/aes.html.]]"},{"key":"e_1_2_2_68_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Murphy S.","year":"2000"},{"key":"e_1_2_2_69_1","doi-asserted-by":"crossref","unstructured":"Murphy S. and Robshaw M. 2002a. Comments on the Security of the AES and the XSL Technique. http:\/\/www.isg.rhul.ac.uk\/~mrobshaw\/rijndael\/xslnote.pdf.]]  Murphy S. and Robshaw M. 2002a. Comments on the Security of the AES and the XSL Technique. http:\/\/www.isg.rhul.ac.uk\/~mrobshaw\/rijndael\/xslnote.pdf.]]","DOI":"10.1049\/el:20030015"},{"key":"e_1_2_2_70_1","volume-title":"22nd Annual International Cryptology Conference, M. Yung, Ed. LNCS","volume":"2442","author":"Murphy S."},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019991004496"},{"key":"e_1_2_2_72_1","doi-asserted-by":"crossref","unstructured":"Nechvatal J. Barker E. Bassham L. Burr W. Dworkin M. Foti J. and Roback E. 2000. Report on the Development of the Advanced Encryption Standard (AES). Tech. rep. NIST.]]  Nechvatal J. Barker E. Bassham L. Burr W. Dworkin M. Foti J. and Roback E. 2000. Report on the Development of the Advanced Encryption Standard (AES). Tech. rep. NIST.]]","DOI":"10.6028\/jres.106.023"},{"key":"e_1_2_2_73_1","unstructured":"NESSIE Consortium 2003. Portfolio of recommended cryptographic primitives. NESSIE Consortium.]]  NESSIE Consortium 2003. Portfolio of recommended cryptographic primitives. NESSIE Consortium.]]"},{"key":"e_1_2_2_74_1","unstructured":"NIST 1998. Skipjack and KEA Algorithm Specifications Version 2.0. NIST.]]  NIST 1998. Skipjack and KEA Algorithm Specifications Version 2.0. NIST.]]"},{"key":"e_1_2_2_75_1","volume-title":"Advances in Cryptology---EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques. LNCS","volume":"950","author":"Nyberg K.","year":"1995"},{"key":"e_1_2_2_76_1","doi-asserted-by":"crossref","unstructured":"Ohta H. and Matsui M. 2000. A Description of the MISTY1 Encryption Algorithm. RFC 2994 Network Working Group IETF. Nov.]]   Ohta H. and Matsui M. 2000. A Description of the MISTY1 Encryption Algorithm. RFC 2994 Network Working Group IETF. Nov.]]","DOI":"10.17487\/rfc2994"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"e_1_2_2_78_1","volume-title":"SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. ACM Press, 95--107","author":"Polastre J."},{"key":"e_1_2_2_79_1","volume-title":"State of the Art in Appplied Cryptography","author":"Preneel B."},{"key":"e_1_2_2_80_1","unstructured":"Preneel B. Biryukov A. Oswald E. Rompay B. V. Granboulan L. Dottax E. Murphy S. Dent A. White J. Dichtl M. Pyka S. Schafheutle M. Serf P. Biham E. Barkan E. Dunkelman O. Quisquater J.-J. Ciet M. Sica F. Knudsen L. Parker M. and Raddum H. 2003. NESSIE Security Report. Deliverable D20 NESSIE Consortium. Feb.]]  Preneel B. Biryukov A. Oswald E. Rompay B. V. Granboulan L. Dottax E. Murphy S. Dent A. White J. Dichtl M. Pyka S. Schafheutle M. Serf P. Biham E. Barkan E. Dunkelman O. Quisquater J.-J. Ciet M. Sica F. Knudsen L. Parker M. and Raddum H. 2003. NESSIE Security Report. Deliverable D20 NESSIE Consortium. Feb.]]"},{"key":"e_1_2_2_81_1","volume-title":"Selected Areas in Cryptography: 9th Annual International Workshop (SAC","volume":"2595","author":"Reichardt B.","year":"2002"},{"key":"e_1_2_2_82_1","volume-title":"Proceedings of the 1994 Leuven Workshop on Fast Software Encryption. Springer-Verlag, 86--96","author":"Rivest R.","year":"1995"},{"key":"e_1_2_2_83_1","unstructured":"Rivest R. Robshaw M. Sidney R. and Yin Y. 1998. The RC6#8482; Block Cipher. Specification version 1.1.]]  Rivest R. Robshaw M. Sidney R. and Yin Y. 1998. The RC6#8482; Block Cipher. Specification version 1.1.]]"},{"key":"e_1_2_2_84_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Sano F."},{"key":"e_1_2_2_85_1","volume-title":"Cambridge Security Workshop Proceedings. LNCS. Springer-Verlag, 191--204","author":"Schneier B.","year":"1994"},{"key":"e_1_2_2_86_1","volume-title":"Applied Cryptography: Protocols, Algorithms and Source Code in C","author":"Schneier B.","year":"1996","edition":"2"},{"key":"e_1_2_2_87_1","unstructured":"Schneier B. 2002a. AES News. Crypto-gram newsletter Counterpane Internet Security Inc. Sept.]]  Schneier B. 2002a. AES News. Crypto-gram newsletter Counterpane Internet Security Inc. Sept.]]"},{"key":"e_1_2_2_88_1","unstructured":"Schneier B. 2002b. More on AES Cryptanalysis. Crypto-gram newsletter Counterpane Internet Security Inc. Oct.]]  Schneier B. 2002b. More on AES Cryptanalysis. Crypto-gram newsletter Counterpane Internet Security Inc. Oct.]]"},{"key":"e_1_2_2_89_1","volume-title":"Twofish: A 128-Bit Block Cipher","author":"Schneier B.","year":"1998"},{"key":"e_1_2_2_90_1","volume-title":"Selected Areas in Cryptography '98, SAC'98, S. Tavares and H. Meijer, Eds. LNCS","volume":"1556","author":"Schneier B."},{"key":"e_1_2_2_91_1","unstructured":"Schneier B. Kelsey J. Whiting D. Wagner D. Hall C. and Ferguson N. 1999b. The Twofish Encryption Algorithm: A 128-Bit Block Cipher. Wiley.]]   Schneier B. Kelsey J. Whiting D. Wagner D. Hall C. and Ferguson N. 1999b. The Twofish Encryption Algorithm: A 128-Bit Block Cipher. Wiley.]]"},{"key":"e_1_2_2_92_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Schneier B."},{"key":"e_1_2_2_93_1","volume-title":"9th International Workshop, FSE","volume":"2365","author":"Shimoyama T.","year":"2002"},{"key":"e_1_2_2_94_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Shimoyama T."},{"key":"e_1_2_2_95_1","volume-title":"11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. 139--144","author":"Slijepcevic S."},{"key":"e_1_2_2_96_1","doi-asserted-by":"crossref","unstructured":"Sugita M. Kobara K. and Imai H. 2001. Security of reduced version of the block cipher camellia against truncated and impossible differential cryptanalysis. In Advances in Cryptology---ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security C. Boyd Ed. LNCS vol. 2248. Springer-Verlag 193--207.]]   Sugita M. Kobara K. and Imai H. 2001. Security of reduced version of the block cipher camellia against truncated and impossible differential cryptanalysis. In Advances in Cryptology---ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security C. Boyd Ed. LNCS vol. 2248. Springer-Verlag 193--207.]]","DOI":"10.1007\/3-540-45682-1_12"},{"key":"e_1_2_2_97_1","volume-title":"Proceedings of the 1st European Workshop Wireless Sensor Networks (EWSN 04)","volume":"2920","author":"Szewczyk R."},{"key":"e_1_2_2_98_1","volume-title":"Archive: Report 2002\/176.]]","author":"Takenaka M.","year":"2002"},{"key":"e_1_2_2_99_1","volume-title":"Proceedings of the 8th Australasian Conference on Information Security and Privacy (ACISP2003)","volume":"2727","author":"Takenaka M."},{"key":"e_1_2_2_100_1","volume-title":"3rd International Conference on Information Security and Cryptology, ICISC","volume":"2015","author":"Tanaka H.","year":"2000"},{"key":"e_1_2_2_101_1","unstructured":"Texas Instruments Inc. 2001. MSP430x13x MSP430x14x Mixed Signal Microcontroller. Datasheet.]]  Texas Instruments Inc. 2001. MSP430x13x MSP430x14x Mixed Signal Microcontroller. Datasheet.]]"},{"key":"e_1_2_2_103_1","volume-title":"Proceedings of the First International Conference on Embedded Networked Sensor Systems. ACM Press, 171--180","author":"van Dam T."},{"key":"e_1_2_2_104_1","volume-title":"Tech. Rep. TR-CTIT-03-45","author":"van Hoesel L.","year":"2003"},{"key":"e_1_2_2_105_1","unstructured":"Whiting D. 1998. http:\/\/www.schneier.com\/code\/twofish-optimized-c.zip.]]  Whiting D. 1998. http:\/\/www.schneier.com\/code\/twofish-optimized-c.zip.]]"},{"key":"e_1_2_2_106_1","volume-title":"Proceedings of the 3rd AES Conference (AES3).]]","author":"Worley J."},{"key":"e_1_2_2_107_1","volume-title":"IEEE Vehicular Technology Conference (VTC","author":"Xue Q.","year":"2003"},{"key":"e_1_2_2_108_1","volume-title":"Proceedings of the IEEE Infocom. USC\/Information Sciences Institute, IEEE","author":"Ye W."},{"key":"e_1_2_2_109_1","volume-title":"9th International Workshop, FSE","volume":"2365","author":"Yeom Y.","year":"2002"},{"key":"e_1_2_2_110_1","volume-title":"Archive: Report 2002\/144.]]","author":"Youssef A.","year":"2002"},{"key":"e_1_2_2_111_1","volume-title":"2nd International Conference on Embedded Networked Sensor Systems. ACM Press, 227--238","author":"Zhang P."},{"key":"e_1_2_2_112_1","volume-title":"10th ACM Conference on Computer and Communications Security (CCS '03)","author":"Zhu S."}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1138127.1138130","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1138127.1138130","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:18:41Z","timestamp":1750263521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1138127.1138130"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2]]},"references-count":109,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,2]]}},"alternative-id":["10.1145\/1138127.1138130"],"URL":"https:\/\/doi.org\/10.1145\/1138127.1138130","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"value":"1550-4859","type":"print"},{"value":"1550-4867","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,2]]},"assertion":[{"value":"2006-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}