S. Badel, N. Dagtekin, J. Nakahara, K. Ouafi, N. Reffé et al., AR- MADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware, Proc. CHES '10, pp.398-412, 2010.

T. P. Berger, M. Minier, and B. Pousse, Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode, Proc. INDOCRYPT '09, pp.119-135, 2009.
DOI : 10.1007/978-3-642-10628-6_8

URL : https://hal.archives-ouvertes.fr/inria-00524359

K. Bicakci, H. Gultekin, and B. Tavli, The impact of one-time energy costs on network lifetime in wireless sensor networks, IEEE Communications Letters, vol.13, issue.12, pp.905-907, 2009.
DOI : 10.1109/LCOMM.2009.12.091331

C. The and . Group, SMART 2020: Enabling the Low Carbon Economy in the Information Age, Global e-Sustainability Initiative (GeSI), 2008.

G. De-meulenaer, F. Gosset, F. Standaert, and O. Pereira, On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp.580-585, 2008.
DOI : 10.1109/WiMob.2008.16

O. Delgado-mohatar, J. M. Sierra, L. Brankovic, and A. Fuster-sabater, An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks, Proc. WISTP '10, pp.332-339, 2010.
DOI : 10.1002/0470848693

URL : https://hal.archives-ouvertes.fr/hal-01056073

Y. Dodis and J. P. Steinberger, Message Authentication Codes from Unpredictable Block Ciphers Advances in Cryptology -CRYPTO '09, LNCS, vol.5677, pp.267-285, 2009.

P. Gauravaram, W. Millan, E. Dawson, and K. Viswanathan, Constructing Secure Hash Functions by Enhancing Merkle-Damg??rd Construction, Proc. ACISP '06, pp.407-470, 2006.
DOI : 10.1007/11780656_34

H. Gilbert, The Security of ???One-Block-to-Many??? Modes of Operation, Proc. FSE '03, pp.376-395, 2003.
DOI : 10.1007/978-3-540-39887-5_27

L. Greenemeier, Can the World's Telecoms Slash their Energy Consumption 1000-Fold?, Scientific American, p.11, 2010.

S. Halevi, W. E. Hall, and C. S. Jutla, The Hash Function " Fugue SHA-3 Candidate Submission, 2009.

J. Kaps, G. Gaubatz, and B. Sunar, Cryptography on a Speck of Dust, Computer, vol.40, issue.2, pp.38-44, 2007.
DOI : 10.1109/MC.2007.52

R. Kayalvizhi, M. Vijayalakshmi, and V. Vaidehi, Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks, Proc. CNSA '10, pp.172-180, 2010.
DOI : 10.1007/978-3-642-14478-3_18

A. Lehmann and S. Tessaro, A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical, Advances in Cryptology -ASIACRYPT '09, pp.364-381, 2009.
DOI : 10.1007/978-3-642-10366-7_22

P. Research, Green' Telecom Equipment will Represent 46% of Network Capital Expenditures by 2013, Pike Research, 2009.

B. Preneel, R. Govaerts, and J. Vandewalle, Hash Functions based on Block Ciphers: a Synthetic Approach Advances in Cryptology -CRYPTO '93, LNCS, vol.773, pp.368-378, 1993.

P. Rogaway and J. Steinberger, Security/Efficiency Tradeoffs for Permutation-Based Hashing, Advances in Cryptology -EUROCRYPT '08, pp.220-236, 2008.
DOI : 10.1007/978-3-540-78967-3_13

P. Rogaway and J. Steinberger, Constructing Cryptographic Hash Functions from Fixed-key Blockciphers Advances in Cryptology -CRYPTO '08, LNCS, vol.5157, pp.433-450, 2008.

A. Shamir and Y. Tauman, Improved Online/Offline Signature Schemes Advances in Cryptology - CRYPTO '01, LNCS 2139, pp.355-367, 2001.

T. Shrimpton and M. Stam, Building a Collision-Resistant Compression Function from Noncompressing Primitives, Proc. ICALP '07, pp.643-654, 2008.

P. Szczechowiak, A. Kargi, M. Scott, and M. Collier, On the application of pairing based cryptography to wireless sensor networks, Proceedings of the second ACM conference on Wireless network security, WiSec '09, pp.1-12, 2009.
DOI : 10.1145/1514274.1514276

J. Troutman and V. Rijmen, Green Cryptography: Cleaner Engineering through Recycling, IEEE Security & Privacy Magazine, vol.7, issue.4, pp.71-73, 2009.
DOI : 10.1109/MSP.2009.91

URL : https://www.cosic.esat.kuleuven.be/publications/article-1328.pdf

R. Weis, W. Effelsberg, and S. Lucks, Remotely keyed encryption with Java cards: a secure and efficient method to encrypt multimedia streams, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532), pp.537-540, 2000.
DOI : 10.1109/ICME.2000.869657