-
1
-
-
70350632503
-
-
+08] Bock, H., Braun, M., Dichtl, M., Hess, E., Heyszl, J., Kargl, W., Koroschetz, H., Meyer, B., Seuschek, H.: A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography. In: Workshop on RFID Security, RFIDsec (2008)
-
+08] Bock, H., Braun, M., Dichtl, M., Hess, E., Heyszl, J., Kargl, W., Koroschetz, H., Meyer, B., Seuschek, H.: A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography. In: Workshop on RFID Security, RFIDsec (2008)
-
-
-
-
2
-
-
70350651041
-
-
+06] Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost elliptic curve cryptography for wireless sensor networks. In: Proceedings of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks (2006)
-
+06] Batina, L., Mentens, N., Sakiyama, K., Preneel, B., Verbauwhede, I.: Low-cost elliptic curve cryptography for wireless sensor networks. In: Proceedings of Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks (2006)
-
-
-
-
3
-
-
35048859848
-
-
[FDW04] Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 357-370. Springer, Heidelberg (2004)
-
[FDW04] Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong authentication for RFID systems using the AES algorithm. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357-370. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
33746739905
-
AES implementation on a grain of sand
-
FWR05
-
[FWR05] Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES implementation on a grain of sand. IEEE Proceedings on Information Security 152, 13-20 (2005)
-
(2005)
IEEE Proceedings on Information Security
, vol.152
, pp. 13-20
-
-
Feldhofer, M.1
Wolkerstorfer, J.2
Rijmen, V.3
-
6
-
-
84942514729
-
-
[GK03] Großschädl, J., Kamendje, G.-A.: Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2m). In: Proc. IEEE International Conference on Application-Specific Systems, Architectures, and Processors (2003)
-
[GK03] Großschädl, J., Kamendje, G.-A.: Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2m). In: Proc. IEEE International Conference on Application-Specific Systems, Architectures, and Processors (2003)
-
-
-
-
8
-
-
70350638690
-
-
[ISO04] ISO/IEC/JTC 1/SC 31. ISO/IEC 18000 Information technology - Radio frequency identification for item management. Technical report, International Organization for Standardization, Geneva, Switzerland (2004)
-
[ISO04] ISO/IEC/JTC 1/SC 31. ISO/IEC 18000 Information technology - Radio frequency identification for item management. Technical report, International Organization for Standardization, Geneva, Switzerland (2004)
-
-
-
-
9
-
-
34548815120
-
Are standards compliant elliptic curve cryptosystems feasible on RFID?
-
KP06, RFIDSec, July
-
[KP06] Kumar, S., Paar, C.: Are standards compliant elliptic curve cryptosystems feasible on RFID? Printed handout of Workshop on RFID Security (RFIDSec) (July 2006)
-
(2006)
Printed handout of Workshop on RFID Security
-
-
Kumar, S.1
Paar, C.2
-
10
-
-
38549171419
-
-
[LV07] Lee, Y.K., Verbauwhede, I.: A compact architecture for montgomery elliptic curve scalar multiplication processor. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, 4867, pp. 115-127. Springer, Heidelberg (2008)
-
[LV07] Lee, Y.K., Verbauwhede, I.: A compact architecture for montgomery elliptic curve scalar multiplication processor. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 115-127. Springer, Heidelberg (2008)
-
-
-
-
11
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Mon87
-
[Mon87] Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48, 243-264 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.L.1
-
12
-
-
0003508562
-
Digital Signature Standard (DSS)
-
Nat00] National Institute for Standards and Technology, Technical report, NIST January
-
[Nat00] National Institute for Standards and Technology. Digital Signature Standard (DSS). Technical report, NIST (January 2000)
-
(2000)
-
-
-
13
-
-
37049031225
-
The economic impact of counterfeiting and piracy
-
Org07] Organisation for Economic Co-operation and Development, Technical report, OECD
-
[Org07] Organisation for Economic Co-operation and Development. The economic impact of counterfeiting and piracy. Technical report, OECD (2007)
-
(2007)
-
-
-
14
-
-
33646775803
-
-
[OScE04] Öztürk, E., Sunar, B., Savaş, E.: Low-power elliptic curve cryptography using scaled modular arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 92-106. Springer, Heidelberg (2004)
-
[OScE04] Öztürk, E., Sunar, B., Savaş, E.: Low-power elliptic curve cryptography using scaled modular arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 92-106. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
70350624463
-
-
+06] Sakiyama, K., Batina, L., Mentens, N., Preneel, B., Verbauwhede, I.: Small-footprint ALU for public-key processors for pervasive security. In: Workshop on RFID Security (2006)
-
+06] Sakiyama, K., Batina, L., Mentens, N., Preneel, B., Verbauwhede, I.: Small-footprint ALU for public-key processors for pervasive security. In: Workshop on RFID Security (2006)
-
-
-
|