-
1
-
-
84957677506
-
Optimal extension fields for fast arithmetic in public-key algorithms
-
Bailey, D.V. and Paar, C. (1998) ‘Optimal extension fields for fast arithmetic in public-key algorithms’, Advances in Cryptography–CRYPTO’98, pp.472–485.
-
(1998)
Advances in Cryptography–CRYPTO’98
, pp. 472-485
-
-
Bailey, D.V.1
Paar, C.2
-
4
-
-
2142786147
-
Efficient elliptic curve exponentiation
-
Cohen, H., Miyaji, A. and Ono, T. (1997) ‘Efficient elliptic curve exponentiation’, Advances in Crytology-Proceedings of ICICS’97, Lecture Notes in Computer Science, Springer-Verlag, pp.282–290.
-
(1997)
Advances in Crytology-Proceedings of ICICS’97, Lecture Notes in Computer Science
, vol.Springer-Verlag
, pp. 282-290
-
-
Cohen, H.1
Miyaji, A.2
Ono, T.3
-
6
-
-
0346290928
-
-
Crossbow Technology INC. (2003) ‘Wireless sensor networks’, Available at: http://www.xbo.com/Products/Wireless_Sensor_Networks.htm.
-
(2003)
Wireless sensor networks
-
-
-
8
-
-
1542376949
-
Analyzing and modeling encryption overhead for sensor network nodes
-
San Diego, CA, September
-
Ganesan, P., Venugopalan, R., Peddabachagari, P., Dean, A., Mueller, F. and Sichitiu, M. (2003) ‘Analyzing and modeling encryption overhead for sensor network nodes’, WSNA03, San Diego, CA, September.
-
(2003)
WSNA03
-
-
Ganesan, P.1
Venugopalan, R.2
Peddabachagari, P.3
Dean, A.4
Mueller, F.5
Sichitiu, M.6
-
9
-
-
0037702249
-
The nesC language: a holistic approach to networked embedded systems
-
June
-
Gay, D., Levis, P., von Behren, R., Welsh, M., Brewer, E. and Culler, D. (2003) ‘The nesC language: a holistic approach to networked embedded systems’, Programming Language Design and Implementation (PLDI), June.
-
(2003)
Programming Language Design and Implementation (PLDI)
-
-
Gay, D.1
Levis, P.2
von Behren, R.3
Welsh, M.4
Brewer, E.5
Culler, D.6
-
10
-
-
33646569085
-
Sizzle: a standards-based end-to-end security architecture for the embedded internet
-
Kauai, March
-
Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H. and Shantz, S.C. (2005) ‘Sizzle: a standards-based end-to-end security architecture for the embedded internet’, Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005), Kauai, March.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communication (PerCom 2005)
-
-
Gupta, V.1
Millard, M.2
Fung, S.3
Zhu, Y.4
Gura, N.5
Eberle, H.6
Shantz, S.C.7
-
11
-
-
27244436587
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
Boston, August
-
Gura, N., Patel, A., Wander, A., Eberle, H. and Shantz, S.C. (2004) ‘Comparing elliptic curve cryptography and rsa on 8-bit cpus’, CHES, Boston, August.
-
(2004)
CHES
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
84958960201
-
A practical implementation of elliptic curve cryptosystems over gf (p) on a 16-bit microcomputer
-
Hasegawa, T., Nakajima, J. and Matsui, M. (1998) ‘A practical implementation of elliptic curve cryptosystems over gf (p) on a 16-bit microcomputer’, Public Key Cryptography PKC’98, pp.182–194.
-
(1998)
Public Key Cryptography PKC’98
, pp. 182-194
-
-
Hasegawa, T.1
Nakajima, J.2
Matsui, M.3
-
13
-
-
0003683288
-
High-speed RSA implementation
-
November
-
Koc, C.K. (1994) ‘High-speed RSA implementation’, RSA Laboratories TR201, November.
-
(1994)
RSA Laboratories TR201
-
-
Koc, C.K.1
-
15
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography
-
Santa Clara, CA, October
-
Malan, D.J. Welsh, M. and Smith, M.D. (2004) ‘A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography’, In The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, CA, October.
-
(2004)
The First IEEE International Conference on Sensor and Ad Hoc Communications and Networks
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
16
-
-
0000266095
-
Speeding up the computations on an elliptic curve using addition-subtraction chains
-
Morain, F. and Olivos, J. (1990) ‘Speeding up the computations on an elliptic curve using addition-subtraction chains’, Theoretical Informatics and Applications, Vol. 24, pp.531–543.
-
(1990)
Theoretical Informatics and Applications
, vol.24
, pp. 531-543
-
-
Morain, F.1
Olivos, J.2
-
17
-
-
84952974896
-
-
Moteiv Co. Telos datasheet (2005) Available at: http://www.moteiv.com/products/docs/tmote-sky-datasheet. pdf.
-
(2005)
-
-
Moteiv Co. Telos datasheet1
-
20
-
-
84952961114
-
-
Tinyos (2005) Available at: http//www.tinyos.net/.
-
(2005)
-
-
Tinyos1
-
21
-
-
0004742708
-
Elliptic curve cryptography on smart cards without coprocessors
-
Bristol, UK, Septemper
-
Woodbury, A.D., Bailey, D.V. and Paar, C. (2000) ‘Elliptic curve cryptography on smart cards without coprocessors’, The Fourth Smart Card Research and Advanced Applications (CARDIS2000) Conference, Bristol, UK, Septemper.
-
(2000)
The Fourth Smart Card Research and Advanced Applications (CARDIS2000) Conference
-
-
Woodbury, A.D.1
Bailey, D.V.2
Paar, C.3
|