-
1
-
-
84966219173
-
Elliptic curves and primality proving
-
ATKIN, A. O. L. ANDMORAIN, F. 1993. Elliptic curves and primality proving. Math. Comput. 29-67.
-
(1993)
Math. Comput.
, pp. 29-67
-
-
Atkin, A.O.L.1
Morain, F.2
-
3
-
-
84957672468
-
Cryptanalysis of RSA with private key d less than N0.292
-
BONEH,D. ANDDURFEE,G. 1999. Cryptanalysis of RSA with private key d less than N0.292. Lecture Notes in Computer Science, vol.1592, 1-9.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 1-9
-
-
Boneh, D.1
Durfee, G.2
-
4
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
CERTICOM, R. Certicom ecc challenge. ECC challenge website
-
CANETTI, R., GARAY, J., ITKIS, G., MICCIANCIO, D., NAOR, M., AND PINKAS, B. 1999. Multicast security: A taxonomy and some efficient constructions. In Proceedings of the 18th IEEE Conference on Computer Communications (Infocom'99). CERTICOM, R. Certicom ecc challenge. ECC challenge website, http://www.certicom.com/index.php?action=res,ecc challenge.
-
(1999)
Proceedings of the 18th IEEE Conference on Computer Communications (Infocom'99)
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
13944281653
-
Tsync: A lightweight bidirectional time synchronization service for wireless sensor networks
-
DAI, H. AND HAN, R. 2004. Tsync: A lightweight bidirectional time synchronization service for wireless sensor networks. ACM SIGMOBILE Mobile Comput. Comm. Rev. 8, 1, 125-139.
-
(2004)
ACM SIGMOBILE Mobile Comput. Comm. Rev.
, vol.8
, Issue.1
, pp. 125-139
-
-
Dai, H.1
Han, R.2
-
8
-
-
11244317648
-
A public-key cryptographic processor for RSA and ECC
-
EBERLE, H., GURA, N., CHANG, S., GUPTA, V., RARICK, L., AND SUNDARAM, S. 2004. A public-key cryptographic processor for RSA and ECC. In Proceedings of the 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP).
-
(2004)
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP)
-
-
Eberle, H.1
Gura, N.2
Chang, S.3
Gupta, V.4
Rarick, L.5
Sundaram, S.6
-
9
-
-
17844362127
-
How to sign digital streams
-
T.J.Watson Research Center
-
GENNARO, R. AND ROHATGI, P. 1997. How to sign digital streams. Tech. rep. IBM T.J.Watson Research Center.
-
(1997)
Tech. Rep. IBM
-
-
Gennaro, R.1
Rohatgi, P.2
-
11
-
-
27244436587
-
Comparing elliptic curve cryptography andRSAon 8-bit CPUs
-
GURA, N., PATEL, A., WANDER, A., EBERLE, H., AND SHANTZ, S. C. 2004. Comparing elliptic curve cryptography andRSAon 8-bit CPUs. In Proceedings of theWorkshop on Cryptographic Hardware and Embedded Systems (CHES'04).
-
(2004)
Proceedings of TheWorkshop on Cryptographic Hardware and Embedded Systems (CHES'04)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
12
-
-
84957669090
-
Building PRFs from PRPs
-
HALL, C.,WAGNER, D., KELSEY, J., AND SCHNEIER, B. 1998. Building PRFs from PRPs. Lecture Notes in Computer Science, vol.1462, 370-389.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 370-389
-
-
Hall, C.1
Wagner, D.2
Kelsey, J.3
Schneier, B.4
-
15
-
-
35248866341
-
On the efficient generation of elliptic curves over prime fields
-
KONSTANTINOU, E., STAMATIOU, Y., AND ZAROLIAGIS, C. 2002. On the efficient generation of elliptic curves over prime fields. Lecture Notes in Computer Science, vol.2523, 333-348.
-
(2002)
Lecture Notes in Computer Science
, vol.2523
, pp. 333-348
-
-
Konstantinou, E.1
Stamatiou, Y.2
Zaroliagis, C.3
-
16
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
LUBY, M. AND RACKOFF, C. 1988. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17, 2, 373-386.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
17
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
MENEZES, A., OKAMOTO, T., AND VANSTONE, A. 1993. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans. Inform. Theory 39, 5, 1639-1646.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, Issue.5
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, A.3
-
20
-
-
0003064824
-
On the construction of pseudorandom permutations: Luby-Rackoff revisited
-
NAOR, M. AND REINGOLD, O. 1999. On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. J. Int. Assoc. Cryptol. Res. 12, 1, 29-66.
-
(1999)
J. Cryptol. J. Int. Assoc. Cryptol. Res.
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
21
-
-
70449096014
-
-
Cyber Defense Lab, North Carolina State University
-
NING, P. 2006. Tinyecc: Elliptic curve cryptography for sensor networks. Cyber Defense Lab, North Carolina State University. http://discovery.csc.ncsu. edu/pning/software/TinyECC/index.html.
-
(2006)
Tinyecc: Elliptic Curve Cryptography for Sensor Networks
-
-
Ning, P.1
-
24
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2001a. Efficient and secure source authentication for multicast. In Proceedings of Network and Distributed System Security Symposium (NDSS'01).
-
(2001)
Proceedings of Network and Distributed System Security Symposium (NDSS'01)
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
25
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
PERRIG, A., SZEWCZYK, R.,WEN, V., CULLAR, D., AND TYGAR, J. D. 2001b. Spins: Security protocols for sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom'01). 189-199.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MobiCom'01)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
26
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
POLLARD, J. M. 1978. Monte Carlo methods for index computation (mod p). Math. Comput. 32, 143, 918-924.
-
(1978)
Math. Comput.
, vol.32
, Issue.143
, pp. 918-924
-
-
Pollard, J.M.1
-
32
-
-
0038443119
-
Next generation security for wireless: Elliptic curve cryptography
-
VANSTONE, S. 2003. Next generation security for wireless: Elliptic curve cryptography. Comput. Secur. 22, 5, 412-459.
-
(2003)
Comput. Secur.
, vol.22
, Issue.5
, pp. 412-459
-
-
Vanstone, S.1
-
33
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor network
-
WANDER, A., GURA, N., EBERLE, H., GUPTA, V., AND SHANTZ, S. 2005. Energy analysis of public-key cryptography for wireless sensor network. In Proceedings of the 3rd Annual IEEE International Conference on Pervasive Computing and Communication (Percom'05).
-
(2005)
Proceedings of the 3rd Annual IEEE International Conference on Pervasive Computing and Communication (Percom'05)
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
38
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
WIENER, M. 1990. Cryptanalysis of short RSA secret exponents. IEEE Trans. Inform. Theory 36, 553-558.
-
(1990)
IEEE Trans. Inform. Theory
, vol.36
, pp. 553-558
-
-
Wiener, M.1
-
41
-
-
17444382005
-
Energy-Balanced task allocation for collaborative processing in wireless sensor networks
-
YU, Y. AND PRANSANNA, V. 2005. Energy-Balanced task allocation for collaborative processing In wireless sensor networks. Mobile Netw. Appl. 10, 115-131.
-
(2005)
Mobile Netw. Appl.
, vol.10
, pp. 115-131
-
-
Yu, Y.1
Pransanna, V.2
|