-
2
-
-
77953058306
-
-
Atmel Corporation, Atmel, available online at
-
Atmel Corporation, AVR Studio 4.14, Atmel, (2005), available online at http://www.atmel.com/.
-
(2005)
AVR Studio 4.14
-
-
-
3
-
-
23944524767
-
-
Certicom Research, available online at
-
Certicom Research, SEC 1: elliptic curve cryptography, (2000), available online at http://www.secg.org.
-
(2000)
SEC 1: Elliptic Curve Cryptography
-
-
-
4
-
-
24944433266
-
m) On 8-bit Microprocessors
-
IEEE
-
m) on 8-bit microprocessors, in Proceedings of IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP'05), IEEE, (2005), 343-349.
-
(2005)
Proceedings of IEEE International Conference on Application-specific Systems, Architectures and Processors (ASAP'05)
, pp. 343-349
-
-
Eberle, H.1
Wander, A.2
Gura, N.3
Chang-Shantz, S.4
Gupta, V.5
-
5
-
-
85074375621
-
Next century challenges: Scalable coordination in sensor networks
-
D. Estrin, R. Govindan, J. S. Heidemann and S. Kumar, Next century challenges: scalable coordination in sensor networks, in Proceedings of Mobile Computing and Networking (Mo-biCom'99), (1999), 263-270.
-
(1999)
In Proceedings of Mobile Computing and Networking (Mo-biCom'99)
, pp. 263-270
-
-
Estrin, D.1
Govindan, R.2
Heidemann, J.S.3
Kumar, S.4
-
6
-
-
79957797091
-
Faster Point Multiplication On Elliptic Curves With Efficient Endomorphisms
-
Springer
-
R. Gallant, R. Lambert and S. Vanstone, Faster point multiplication on elliptic curves with efficient endomorphisms, in Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO'01), Springer, (2001), 190-200.
-
(2001)
In Proceedings of The 21st Annual International Cryptology Conference On Advances In Cryptology (CRYPTO'01)
, pp. 190-200
-
-
Gallant, R.1
Lambert, R.2
Vanstone, S.3
-
8
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Springer
-
N. Gura, A. Patel, A. Wander, H. Eberle and S. C. Shantz, Comparing elliptic curve cryptography and RSA on 8-bit CPUs, In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES'04), Springer, (2004), 119-132.
-
(2004)
In Proceedings of Workshop On Cryptographic Hardware and Embedded Systems (CHES'04)
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
11244267013
-
Guide to Elliptic Curve Cryptography
-
Springer-Verlag, Secaucus
-
D. Hankerson, A. J. Menezes and S. Vanstone, Guide to Elliptic Curve Cryptography, Springer-Verlag, Secaucus, 2003.
-
(2003)
-
-
Hankerson, D.1
Menezes, J.2
Vanstone, S.3
-
10
-
-
0036870095
-
MICA: A wireless platform for deeply embedded networks
-
J. L. Hill and D. E. Culler, MICA: a wireless platform for deeply embedded networks, IEEE Micro., 22 (2002), 12-24.
-
(2002)
IEEE Micro
, vol.22
, pp. 12-24
-
-
Hill, J.L.1
Culler, D.E.2
-
11
-
-
0001464763
-
Multiplication of many-digital numbers by automatic computers
-
A. Karatsuba and Y. Ofman, Multiplication of many-digital numbers by automatic computers, Transl. Physics-Doklady, 7 (1963), 595-596.
-
(1963)
Transl. Physics-Doklady
, vol.7
, pp. 595-596
-
-
Karatsuba, A.1
Ofman, Y.2
-
13
-
-
26444574670
-
TinySec: A link layer security architecture for wireless sensor networks
-
ACM
-
C. Karlof, N. Sastry and D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, In Proceedings of 2nd ACM Conference on Embedded Networked Sensor Systems (SenSys'04), ACM, (2004), 162-175.
-
(2004)
In Proceedings of 2nd ACM Conference On Embedded Networked Sensor Systems (SenSys'04)
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
14
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Math. Comput., 48 (1987), 203-209.
-
(1987)
Math. Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
15
-
-
85009967725
-
Constructing elliptic curves with given group order over large finite fields
-
G.-J. Lay and H. G. Zimmer, Constructing elliptic curves with given group order over large finite fields, in Algorithmic Number Theory, (1994), 250-263.
-
(1994)
In Algorithmic Number Theory
, pp. 250-263
-
-
Lay, G.-J.1
Zimmer, H.G.2
-
21
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto and S. Vanstone, Reducing elliptic curve logarithms to logarithms in a finite field, IEEE Trans. Inform. Theory, 39 (1993), 1639-1646.
-
(1993)
IEEE Trans. Inform. Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
22
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Springer
-
V. Miller, Uses of elliptic curves in cryptography, in ''Advances in Cryptology (CRYPTO'85), Springer, (1986), 417-426.
-
(1986)
Advances In Cryptology (CRYPTO'85)
, pp. 417-426
-
-
Miller, V.1
-
23
-
-
46749097974
-
TinyTate: Computing the Tate pairing in resource-constrained sensor nodes
-
IEEE
-
L. B. Oliveira, D. F. Aranha, E. Morais, F. Daguano, J. López and R. Dahab, TinyTate: computing the Tate pairing in resource-constrained sensor nodes, in ''Proceedings of IEEE International Symposium on Network Computing and Applications (NCA'07), IEEE, (2007), 318-323.
-
(2007)
Proceedings of IEEE International Symposium On Network Computing and Applications (NCA'07)
, pp. 318-323
-
-
Oliveira, L.B.1
Aranha, D.F.2
Morais, E.3
Daguano, F.4
López, J.5
Dahab, R.6
-
24
-
-
71049167860
-
Secure-TWS: Authenticating node to multi-user communication in shared sensor networks
-
IEEE
-
L. B. Oliveira, A. Kansal, B. Priyantha, M. Goraczko and F. Zhao, Secure-TWS: authenticating node to multi-user communication in shared sensor networks, in ''Proceedings of International Conference on Information Processing in Sensor Networks (IPSN'09),'' IEEE, (2009), 289-300.
-
(2009)
Proceedings of International Conference On Information Processing In Sensor Networks (IPSN'09)
, pp. 289-300
-
-
Oliveira, L.B.1
Kansal, A.2
Priyantha, B.3
Goraczko, M.4
Zhao, F.5
-
25
-
-
53149126145
-
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
-
IEEE
-
L. B. Oliveira, M. Scott, J. López and R. Dahab, TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks, in Proceedings of International Conference on Networked Sensing Systems (INSS'08), IEEE, (2008), 173-180.
-
(2008)
Proceedings of International Conference On Networked Sensing Systems (INSS'08)
, pp. 173-180
-
-
Oliveira, L.B.1
Scott, M.2
López, J.3
Dahab, R.4
-
26
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, SPINS: security protocols for sensor networks, Wireless Networks, 8 (2002), 521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
27
-
-
0037273463
-
Fast computation of canonical lifts of elliptic curves and its application to point counting
-
T. Satoh, B. Skjernaa and Y. Taguchi, Fast computation of canonical lifts of elliptic curves and its application to point counting, Finite Fields Appl., 9 (2003), 89-101.
-
(2003)
Finite Fields Appl
, vol.9
, pp. 89-101
-
-
Satoh, T.1
Skjernaa, B.2
Taguchi, Y.3
-
30
-
-
0010029876
-
Efficient arithmetic on Koblitz curves
-
J. A. Solinas, Efficient arithmetic on Koblitz curves, Designs Codes Cryptogr., 19 (2000), 195-249.
-
(2000)
Designs Codes Cryptogr
, vol.19
, pp. 195-249
-
-
Solinas, J.A.1
-
31
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Springer
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier and R. Dahab, NanoECC: testing the limits of elliptic curve cryptography in sensor networks, in ''Proceedings of European Conference on Wireless Sensor Networks (EWSN'08),'' Springer, (2008), 305-320.
-
(2008)
Proceedings of European Conference On Wireless Sensor Networks (EWSN'08)
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
|