메뉴 건너뛰기




Volumn 3, Issue 1, 2011, Pages 31-48

Computational and energy costs of cryptographic algorithms on handheld devices

Author keywords

ARM architecture; Cryptography; Energy; Performance; Time delay; Ubiquitous networks

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84855203308     PISSN: None     EISSN: 19995903     Source Type: Journal    
DOI: 10.3390/fi3010031     Document Type: Article
Times cited : (89)

References (23)
  • 5
    • 33646382089 scopus 로고    scopus 로고
    • A study of the energy consumption characteristics of cryptographic algorithms and security protocols
    • Potlapally, N.; Ravi, S.; Raghunathan, A.; Jha, N. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. Trans. Mobile Comput. 2006, 5, 128–143.
    • (2006) Trans. Mobile Comput , vol.5 , pp. 128-143
    • Potlapally, N.1    Ravi, S.2    Raghunathan, A.3    Jha, N.4
  • 10
    • 23044435711 scopus 로고    scopus 로고
    • Short Signatures from the Weil Pairing
    • Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. J. Cryptol. 2004, 17, 297–319.
    • (2004) J. Cryptol , vol.17 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 11
    • 38149009170 scopus 로고    scopus 로고
    • Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
    • Boneh, D.; Boyen, X. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptol. 2008, 21, 149–177.
    • (2008) J. Cryptol , vol.21 , pp. 149-177
    • Boneh, D.1    Boyen, X.2
  • 15
    • 0002474948 scopus 로고    scopus 로고
    • Performance Comparison of Public-Key Cryptosystems, SmartCard Crypto-Coprocessors for Public-Key Cryptography, Chaffing and Winnowing: Confidentiality without Encryption, DES, Triple-DES and AES
    • Wiener, M.J.; Handschuh, H.; Paillier, P.; Rivest, R.L.; Biham, E.; Knudsen, L.R. Performance Comparison of Public-Key Cryptosystems, SmartCard Crypto-Coprocessors for Public-Key Cryptography, Chaffing and Winnowing: Confidentiality without Encryption, DES, Triple-DES and AES. CryptoBytes 1998, 4, 1–3.
    • (1998) CryptoBytes , vol.4 , pp. 1-3
    • Wiener, M.J.1    Handschuh, H.2    Paillier, P.3    Rivest, R.L.4    Biham, E.5    Knudsen, L.R.6
  • 19
    • 22144445920 scopus 로고    scopus 로고
    • The Weil Pairing, and its Efficient Calculation
    • Miller, V.S. The Weil Pairing, and its Efficient Calculation. J. Cryptol. 2004, 17, 235–261.
    • (2004) J. Cryptol , vol.17 , pp. 235-261
    • Miller, V.S.1
  • 23
    • 77954302282 scopus 로고    scopus 로고
    • Energy efficient scheduling for downlink elastic traffic in wireless networks
    • Lee, J.; Bahk, S. Energy efficient scheduling for downlink elastic traffic in wireless networks. Wirel. Comm. Mobile Comput. 2010, 10, 932–941.
    • (2010) Wirel. Comm. Mobile Comput , vol.10 , pp. 932-941
    • Lee, J.1    Bahk, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.