-
2
-
-
30344439619
-
-
S. Garfinkel and B. Rosenberg (Eds.), Addison-Wesley
-
S. Garfinkel and B. Rosenberg (Eds.), RFID Applications, Security, and Privacy, Addison-Wesley, 2005.
-
(2005)
RFID Applications, Security, and Privacy
-
-
-
3
-
-
70350679379
-
-
U.S. National Security Agency
-
U.S. National Security Agency, "The Case for Elliptic Curve Cryptography," http://www.nsa.govMsiness/programs/elliptic-curve.shtml
-
The Case for Elliptic Curve Cryptography
-
-
-
7
-
-
85057426796
-
-
Chapman & Hall/CRC
-
R. Avanzi, H. Cohen, C. Doche, G. Frey, T. Lange K. Nguyen, and F. Vercauteren, Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman & Hall/CRC, 2005.
-
(2005)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Avanzi, R.1
Cohen, H.2
Doche, C.3
Frey, G.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
8
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorization
-
P.L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization," Math, of Computation, Vol.48, 1987.
-
(1987)
Math, of Computation
, vol.48
-
-
Montgomery, P.L.1
-
11
-
-
84947733936
-
Power analysis breaks elliptic curve cryptosystems even secure against the timing attack
-
K. Okeya and K. Sakurai, "Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure Against the Timing Attack," Progress in Cryptography, LNCS, Vol.1977, 2000.
-
(2000)
Progress in Cryptography, LNCS
, vol.1977
-
-
Okeya, K.1
Sakurai, K.2
-
12
-
-
33646840584
-
Projective coordinates leak
-
D. Naccache, N.P. Smart, and J. Stern, "Projective Coordinates Leak," Advances in Cryptography, LNCS, Vol.3027, 2004.
-
(2004)
Advances in Cryptography, LNCS
, vol.3027
-
-
Naccache, D.1
Smart, N.P.2
Stern, J.3
-
13
-
-
77950976771
-
Hardware design issues in elliptic curve cryptography
-
N. Sklavos and X. Zhang (Eds.), CRC Press
-
A.P. Fournaris and O. Koufopavlou, "Hardware Design Issues in Elliptic Curve Cryptography," Wireless Security and Cryptography, Specifications and Implementations, N. Sklavos and X. Zhang (Eds.), CRC Press, 2007.
-
(2007)
Wireless Security and Cryptography, Specifications and Implementations
-
-
Fournaris, A.P.1
Koufopavlou, O.2
-
15
-
-
33745654539
-
RFID-tags for anti-counterfeiting
-
Springer-Verlag
-
P. Tuyls and L. Batina, "RFID-Tags for Anti-Counterfeiting," Cryptographers ' Track of RSA Conference (CT-RSA), LNCS, Vol.3860, Springer-Verlag, 2006.
-
(2006)
Cryptographers ' Track of RSA Conference (CT-RSA), LNCS
, vol.3860
-
-
Tuyls, P.1
Batina, L.2
-
16
-
-
84876375076
-
Low-cost elliptic curve cryptography for wireless sensor networks
-
L. Batina, N. Mentens, K. Sakiyama, B. Preneed, and I. Verbauwhede, "Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks," European Workshop on Security and Privacy in Ad hoc and Sensor Networks, LNCS Vol.4357, 2006.
-
(2006)
European Workshop on Security and Privacy in Ad Hoc and Sensor Networks, LNCS
, vol.4357
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneed, B.4
Verbauwhede, I.5
-
17
-
-
34547688845
-
Public key cryptography for rfid-tags
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public Key Cryptography for RFID-Tags," IEEE Int. Workshop on Pervasive Computing and Commun. Security, 2007.
-
(2007)
IEEE Int. Workshop on Pervasive Computing and Commun. Security
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
18
-
-
54049143316
-
Elliptic-curve-based security processor for RFID
-
Y.K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID," IEEE Trans. on Comput, 2008.
-
(2008)
IEEE Trans. on Comput
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
21
-
-
85085482944
-
Scalable elliptic curve encryption processor for portable application
-
C. Huang, J. Lai, J. Ren and Qianling Zhang, "Scalable Elliptic Curve Encryption Processor for Portable Application," Int. Conf. on ASIC, 2003.
-
(2003)
Int. Conf. on ASIC
-
-
Huang, C.1
Lai, J.2
Ren, J.3
Zhang, Q.4
|