메뉴 건너뛰기




Volumn , Issue , 2010, Pages 818-822

Fast algorithm in ECC for wireless sensor network

Author keywords

Elliptic curve cryptography; Hamming weight; Non adjacent form; One's complement subtraction; ROM; Scalar multiplication; Wireless sensor networks

Indexed keywords

ELLIPTIC CURVE CRYPTOGRAPHY; HAMMING WEIGHT; NON-ADJACENT FORM; ONE'S COMPLEMENT SUBTRACTIONS; SCALAR MULTIPLICATION;

EID: 79952380264     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (10)

References (19)
  • 1
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, 2002. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 5
    • 8344252086 scopus 로고    scopus 로고
    • Detection of moving radioactive sources using sensor networks
    • D. L. Stephens, Jr. and A. J. Peurrung, "Detection of moving radioactive sources using sensor networks," Nuclear Science, IEEE Transactions on, vol. 51, pp. 2273-2278, 2004.
    • (2004) Nuclear Science, IEEE Transactions on , vol.51 , pp. 2273-2278
    • Stephens Jr., D.L.1    Peurrung, A.J.2
  • 9
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • Springer-Verlag
    • V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology - CRYPTO '85: Proceedings. vol. 218: Springer-Verlag, 1986, pp. 417-426.
    • (1986) Advances in Cryptology - CRYPTO '85: Proceedings , vol.218 , pp. 417-426
    • Miller, V.S.1
  • 10
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N.Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 11
    • 4243378405 scopus 로고    scopus 로고
    • Technical report,Institute of Computing, Sate University of Campinas, Sao Paulo, Brazil, May
    • J. Lopez and R. Dahab., " An overview of elliptic curve cryptography," Technical report,Institute of Computing, Sate University of Campinas, Sao Paulo, Brazil, May 2000.
    • (2000) An Overview of Elliptic Curve Cryptography
    • Lopez, J.1    Dahab, R.2
  • 13
    • 49949083706 scopus 로고    scopus 로고
    • Elliptic curve cryptography-based access control in sensor networks
    • H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," Int. J. Security and Networks, vol. 1, pp. 127-137, 2006.
    • (2006) Int. J. Security and Networks , vol.1 , pp. 127-137
    • Wang, H.1    Sheng, B.2    Li, Q.3
  • 15
  • 16
    • 20344381294 scopus 로고    scopus 로고
    • A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
    • 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004
    • D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004)2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), 2004, pp. 71-80. (Pubitemid 40789266)
    • (2004) 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004 , pp. 71-80
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.