-
1
-
-
35048859848
-
Strong Authentication for RFID Systems using the AES Algorithm
-
Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. M. Joye and J.-J. Quisquater, Eds., Springer, August
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong Authentication for RFID Systems using the AES Algorithm," in Cryptographic Hardware and Embedded Systems - CHES 2004, 6th International Workshop, Cambridge, MA, USA, August 11-13, 2004, Proceedings, ser. Lecture Notes in Computer Science, M. Joye and J.-J. Quisquater, Eds., vol. 3156. Springer, August 2004, pp. 357-370.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
2
-
-
4143091512
-
-
January available online at [Online]. Available: http://www.itl.nist.gov/ fipspubs
-
National Institute of Standards and Technology (NIST), "FIPS-186-2: Digital Signature Standard (DSS)," January 2000, available online at http://www.itl.nist.gov/fipspubs/. [Online]. Available: http://www.itl.nist.gov/ fipspubs/
-
(2000)
FIPS-186-2: Digital Signature Standard (DSS)
-
-
-
4
-
-
84876375076
-
Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
-
Revised Selected Papers, L. Buttyán, V. Gligor, and D. Westhoff, Eds., Berlin Heidelberg: Springer-Verlag
-
L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks," in Security and Privacy in Ad-Hoc and Sensor Networks - ESAS 2006, Third European Workshop, Hamburg, Germany, September 20-21, 2006, Revised Selected Papers, L. Buttyán, V. Gligor, and D. Westhoff, Eds., vol. 4357. Berlin Heidelberg: Springer-Verlag, 2006, pp. 6-17.
-
(2006)
Security and Privacy in Ad-Hoc and Sensor Networks - ESAS 2006, Third European Workshop, Hamburg, Germany, September 20-21, 2006
, vol.4357
, pp. 6-17
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
5
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
November [Online]. Available
-
Y. K. Lee, K. Sakiyama, L. Batina, and I. Verbauwhede, "Elliptic-Curve-Based Security Processor for RFID," IEEE Transactions on Computers, vol. 57, no. 11, pp. 1514-1527, November 2008. [Online]. Available: http://ieeexplore.ieee.orgistamp/stamp.jsp?tp=&arnumber= 4604657&isnumber=4633723
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
6
-
-
70350639755
-
ECC is Ready for RFID - A Proof in Silicon
-
Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, Canada, August 14-15, 2008, Revised Selected Papers, ser. September
-
D. Hein, J. Wolkerstorfer, and N. Felber, "ECC is Ready for RFID - A Proof in Silicon," in Selected Areas in Cryptography, 15th International Workshop, SAC 2008, Sackville, Canada, August 14-15, 2008, Revised Selected Papers, ser. Lecture Notes in Computer Science (LNCS), September 2008.
-
(2008)
Lecture Notes in Computer Science (LNCS)
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
7
-
-
77953885098
-
A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography
-
H. Bock, M. Braun, M. Dichtl, E. Hess, J. Heyszl, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek, "A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography," Invited talk at RFIDsec 2008, July 2008.
-
Invited Talk at RFIDsec 2008, July 2008
-
-
Bock, H.1
Braun, M.2
Dichtl, M.3
Hess, E.4
Heyszl, J.5
Kargl, W.6
Koroschetz, H.7
Meyer, B.8
Seuschek, H.9
-
8
-
-
52949086079
-
Is Elliptic-Curve Cryptography Suitable for Small Devices?
-
J. Wolkerstorfer, "Is Elliptic-Curve Cryptography Suitable for Small Devices?" in Workshop on RFID and Lightweight Crypto, July 13-15, 2005, Graz, Austria, 2005, pp. 78-91.
-
Workshop on RFID and Lightweight Crypto, July 13-15, 2005, Graz, Austria, 2005
, pp. 78-91
-
-
Wolkerstorfer, J.1
-
9
-
-
78650123975
-
An ECDSA Processor for RFID Authentication
-
Workshop on RFID Security - RFIDsec 2010, 6th Workshop, Istanbul, Turkey, June 7-9, 2010, Proceedings, ser. B. Drs, Ed. Springer
-
M. Hutter, M. Feldhofer, and T. Plos, "An ECDSA Processor for RFID Authentication," in Workshop on RFID Security - RFIDsec 2010, 6th Workshop, Istanbul, Turkey, June 7-9, 2010, Proceedings, ser. Lecture Notes in Computer Science, B. Drs, Ed. Springer, 2010.
-
(2010)
Lecture Notes in Computer Science
-
-
Hutter, M.1
Feldhofer, M.2
Plos, T.3
-
10
-
-
79953104476
-
Low-resource hardware design of an elliptic curve processor for contactless devices
-
Springer
-
E. Wenger, M. Feldhofer, and N. Felber, "Low-resource hardware design of an elliptic curve processor for contactless devices," in 11th International Workshop on Information Security Applications (WISA 2010), Jeju Island, Korea, August 24-26, 2010, Proceedings. Springer, 2010, pp. ??-??
-
(2010)
11th International Workshop on Information Security Applications (WISA 2010), Jeju Island, Korea, August 24-26, 2010, Proceedings
-
-
Wenger, E.1
Feldhofer, M.2
Felber, N.3
-
11
-
-
84966243285
-
Modular Multiplication without Trial Division
-
P. L. Montgomery, "Modular Multiplication without Trial Division," Mathematics of Computation, vol. 44, pp. 519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 519-521
-
-
Montgomery, P.L.1
-
12
-
-
0012584245
-
-
National Securtiy Agency, Tech. Rep., Sep. 09 [Online]. Available
-
J. A. Solinas, "Generalized mersenne numbers," National Securtiy Agency, Tech. Rep., Sep. 09 1999. [Online]. Available: http://citeseer.ist.psu.edu/236150.html;http://cacr.uwaterloo.ca/techreports/ 1999/corr99-39.ps
-
(1999)
Generalized Mersenne Numbers
-
-
Solinas, J.A.1
-
13
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods of Factorization
-
January iSSN 0025-5718
-
P. L. Montgomery, "Speeding the Pollard and Elliptic Curve Methods of Factorization," Mathematics of Computation, vol. 48, no. 177, pp. 243-264, January 1987, iSSN 0025-5718.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
14
-
-
84958955271
-
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks
-
Springer-Verlag
-
T. Izu and T. Takagi, "A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks," in 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 1214, 2002 Proceedings, vol. 2274. Springer-Verlag, 2002, pp. 280-296.
-
(2002)
5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 1214, 2002 Proceedings
, vol.2274
, pp. 280-296
-
-
Izu, T.1
Takagi, T.2
-
15
-
-
2342647538
-
Efficient scalable V LSI architecture for montgomery inversion in GF(p)
-
[Online]. Available: http://dx.doi.org/10.1016/j.vlsi.2003.12.001
-
A. A.-A. Gutub and A. F. Tenca, "Efficient scalable V LSI architecture for montgomery inversion in GF(p)," Integration, vol. 37, no. 2, pp. 103-120, 2004. [Online]. Available: http://dx.doi.org/10.1016/j.vlsi. 2003.12.001
-
(2004)
Integration
, vol.37
, Issue.2
, pp. 103-120
-
-
Gutub, A.A.-A.1
Tenca, A.F.2
-
16
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Cryptographic Hardware and Embedded Systems - CHES'99, First International Workshop, Worcester, MA, USA, August 12-13, 1999, Proceedings, ser. Ç. K. Koç and C. Paar, Eds., Springer
-
J.-S. Coron, "Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems," in Cryptographic Hardware and Embedded Systems - CHES'99, First International Workshop, Worcester, MA, USA, August 12-13, 1999, Proceedings, ser. Lecture Notes in Computer Science, Ç. K. Koç and C. Paar, Eds., vol. 1717. Springer, 1999, pp. 292-302.
-
(1999)
Lecture Notes in Computer Science
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
|