-
1
-
-
34548356697
-
Energy evaluation of software implementations of block ciphers under memory constraints
-
Nice, France, 16–20 April 2007
-
Großschädl, J.; Tillich, S.; Rechberger, C.; Hofmann, M.; Medwed, M. Energy evaluation of software implementations of block ciphers under memory constraints. In Proceedings of Design, Automation and Test in Europe (DATE) Conference, Nice, France, 16–20 April 2007; pp. 1110–1115.
-
Proceedings of Design, Automation and Test in Europe (DATE) Conference
, pp. 1110-1115
-
-
Großschädl, J.1
Tillich, S.2
Rechberger, C.3
Hofmann, M.4
Medwed, M.5
-
2
-
-
84934300668
-
Computing Cryptographic Algorithms in Portable and Embedded Devices
-
Orlando, FL, USA, 25–29 May 2007
-
Ramachandran, A.; Zhou, Z.; Huang, D. Computing Cryptographic Algorithms in Portable and Embedded Devices. In Proceedings of IEEE International Conference on Portable Information Devices (PORTABLE), Orlando, FL, USA, 25–29 May 2007; pp. 1–7.
-
Proceedings of IEEE International Conference on Portable Information Devices (PORTABLE)
, pp. 1-7
-
-
Ramachandran, A.1
Zhou, Z.2
Huang, D.3
-
3
-
-
27344459927
-
Performance and energy efficiency of block ciphers in personal digital assistants
-
Kauai Island, HI, USA, 8–12 March 2005
-
Hager, C.; Midkiff, S.; Park, J.; Martin, T. Performance and energy efficiency of block ciphers in personal digital assistants. In Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom), Kauai Island, HI, USA, 8–12 March 2005; pp. 127–136.
-
Proceedings of IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 127-136
-
-
Hager, C.1
Midkiff, S.2
Park, J.3
Martin, T.4
-
4
-
-
26844467743
-
On digital signatures in ad hoc networks
-
Westhoff, D.; Lamparter, B.; Paar, C.; Weimerskirch, A. On digital signatures in ad hoc networks. J. Eur. Trans. Telecom. 2005, 16, 411–425.
-
(2005)
J. Eur. Trans. Telecom
, vol.16
, pp. 411-425
-
-
Westhoff, D.1
Lamparter, B.2
Paar, C.3
Weimerskirch, A.4
-
5
-
-
33646382089
-
A study of the energy consumption characteristics of cryptographic algorithms and security protocols
-
Potlapally, N.; Ravi, S.; Raghunathan, A.; Jha, N. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. Trans. Mobile Comput. 2006, 5, 128–143.
-
(2006)
Trans. Mobile Comput
, vol.5
, pp. 128-143
-
-
Potlapally, N.1
Ravi, S.2
Raghunathan, A.3
Jha, N.4
-
6
-
-
85109137792
-
Memory Performance of Public-Key cryptography Methods in Mobile Environments
-
New Orleans, LA, USA, 27 September–1 October
-
Branovic, I.; Giorgi, R.; Martinelli, E. Memory Performance of Public-Key cryptography Methods in Mobile Environments. In Proceedings of ACM SIGARCH Workshop on MEmory Performance: DEaling with Applications, Systems and Architecture (MEDEA), New Orleans, LA, USA, 27 September–1 October 2003; pp. 24–31.
-
(2003)
Proceedings of ACM SIGARCH Workshop on MEmory Performance: DEaling with Applications, Systems and Architecture (MEDEA)
, pp. 24-31
-
-
Branovic, I.1
Giorgi, R.2
Martinelli, E.3
-
7
-
-
84860251024
-
Energy consumption and computational analysis of rijndael-AES
-
Tashkent, Uzbekistan, 26–28 September 2007
-
Razvi Doomun, M.; Sunjiv Soyjaudah, K.; Bundhoo, D. Energy consumption and computational analysis of rijndael-AES. In Proceedings of International Conference in Central Asia on Internet, Tashkent, Uzbekistan, 26–28 September 2007; pp. 1–6.
-
Proceedings of International Conference in Central Asia on Internet
, pp. 1-6
-
-
Razvi Doomun, M.1
Sunjiv Soyjaudah, K.2
Bundhoo, D.3
-
8
-
-
33646754186
-
Finding Collisions in the Full SHA-1
-
Santa Barbara, CA, USA, 14–18 August 2005
-
Wang, X.; Yin, Y.L.; Yu, H. Finding Collisions in the Full SHA-1. In Proceedings of CRYPTO: 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2005; pp. 17–36.
-
Proceedings of CRYPTO: 25th Annual International Cryptology Conference
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
9
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Aarhus, Denmark, 22–26 May 2005
-
Wang, X.; Yu, H. How to Break MD5 and Other Hash Functions. In Proceedings of EUROCRYPT: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; pp. 19–35.
-
Proceedings of EUROCRYPT: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
10
-
-
23044435711
-
Short Signatures from the Weil Pairing
-
Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. J. Cryptol. 2004, 17, 297–319.
-
(2004)
J. Cryptol
, vol.17
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
11
-
-
38149009170
-
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
-
Boneh, D.; Boyen, X. Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptol. 2008, 21, 149–177.
-
(2008)
J. Cryptol
, vol.21
, pp. 149-177
-
-
Boneh, D.1
Boyen, X.2
-
12
-
-
54249121607
-
-
Ph.D. Thesis, Standford University, Palo Alto, CA, USA, June
-
Lynn, B. On the Implementation of Pairing-Based Cryptosystems. Ph.D. Thesis, Standford University, Palo Alto, CA, USA, June 2007.
-
(2007)
On the Implementation of Pairing-Based Cryptosystems
-
-
Lynn, B.1
-
13
-
-
84855351615
-
-
D.SPA.13; ICT-2007-216676; ECRYPT II Network of Excellence, Leuven, Belgium, March
-
Babbage, S.; Catalano, D.; Cid, C.; Weger, B.; Dunkelman, O.; Gehrmann, C.; Granboulan, L.; Guneysu, T.; Lange, T.; Lenstra, A.; Mitchell, C.; Naslund, M.; Nguyen, P.; Paar, C.; Paterson, K.; Pelzl, J.; Pornin, T.; Preneel, B.; Rechberger, C.; Rijmen, V.; Robshaw, M.; Rupp, A.; Schlaffer, M.; Vaudenay, S.; Vercauteren, D.; Ward, M. Yearly Report on Algorithms and Keysizes (2009-2010); D.SPA.13; ICT-2007-216676; ECRYPT II Network of Excellence, Leuven, Belgium, March 2010.
-
(2010)
Yearly Report on Algorithms and Keysizes (2009-2010)
-
-
Babbage, S.1
Catalano, D.2
Cid, C.3
Weger, B.4
Dunkelman, O.5
Gehrmann, C.6
Granboulan, L.7
Guneysu, T.8
Lange, T.9
Lenstra, A.10
Mitchell, C.11
Naslund, M.12
Nguyen, P.13
Paar, C.14
Paterson, K.15
Pelzl, J.16
Pornin, T.17
Preneel, B.18
Rechberger, C.19
Rijmen, V.20
Robshaw, M.21
Rupp, A.22
Schlaffer, M.23
Vaudenay, S.24
Vercauteren, D.25
Ward, M.26
more..
-
14
-
-
33751508709
-
-
Technical Report; Special Publication 800-57; US National Institute for Standards and Technology, Gaithersburg, MD, USA, March
-
Barker, E.; Barker, W.; Burr, W.; Polk, W.; Smid, M. NIST, Recommendation for Key Management, Part 1: General (Revised); Technical Report; Special Publication 800-57; US National Institute for Standards and Technology, Gaithersburg, MD, USA, March 2007.
-
(2007)
NIST, Recommendation for Key Management, Part 1: General (Revised)
-
-
Barker, E.1
Barker, W.2
Burr, W.3
Polk, W.4
Smid, M.5
-
15
-
-
0002474948
-
Performance Comparison of Public-Key Cryptosystems, SmartCard Crypto-Coprocessors for Public-Key Cryptography, Chaffing and Winnowing: Confidentiality without Encryption, DES, Triple-DES and AES
-
Wiener, M.J.; Handschuh, H.; Paillier, P.; Rivest, R.L.; Biham, E.; Knudsen, L.R. Performance Comparison of Public-Key Cryptosystems, SmartCard Crypto-Coprocessors for Public-Key Cryptography, Chaffing and Winnowing: Confidentiality without Encryption, DES, Triple-DES and AES. CryptoBytes 1998, 4, 1–3.
-
(1998)
CryptoBytes
, vol.4
, pp. 1-3
-
-
Wiener, M.J.1
Handschuh, H.2
Paillier, P.3
Rivest, R.L.4
Biham, E.5
Knudsen, L.R.6
-
17
-
-
33750333415
-
-
Technical Report; University of Michigan, Ann Arbor, MI, USA
-
Jansma, N.; Arrendondo, B. Performance Comparison of Elliptic Curve and RSA Digital Signatures; Technical Report; University of Michigan, Ann Arbor, MI, USA, 2004.
-
(2004)
Performance Comparison of Elliptic Curve and RSA Digital Signatures
-
-
Jansma, N.1
Arrendondo, B.2
-
18
-
-
12744279165
-
On the performance, feasibility, and use of forward-secure signatures
-
Washington, DC, USA, 27–30 October 2003
-
Cronin, E.; Jamin, S.; Malkin, T.; McDaniel, P. On the performance, feasibility, and use of forward-secure signatures. In Proceedings of ACM Conference on Computer and Communication Security, Washington, DC, USA, 27–30 October 2003; pp. 131–144.
-
Proceedings of ACM Conference on Computer and Communication Security
, pp. 131-144
-
-
Cronin, E.1
Jamin, S.2
Malkin, T.3
McDaniel, P.4
-
19
-
-
22144445920
-
The Weil Pairing, and its Efficient Calculation
-
Miller, V.S. The Weil Pairing, and its Efficient Calculation. J. Cryptol. 2004, 17, 235–261.
-
(2004)
J. Cryptol
, vol.17
, pp. 235-261
-
-
Miller, V.S.1
-
20
-
-
33745774761
-
Aggregated path authentication for efficient BGP security
-
Alexandria, VA, USA, 7–11 November 2005
-
Zhao, M.; Smith, S.W.; Nicol, D.M. Aggregated path authentication for efficient BGP security. In Proceedings of ACM Conference on Computer and Communication Security, Alexandria, VA, USA, 7–11 November 2005; pp. 128–138.
-
Proceedings of ACM Conference on Computer and Communication Security
, pp. 128-138
-
-
Zhao, M.1
Smith, S.W.2
Nicol, D.M.3
-
22
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for SSL
-
Atlanta, GA, USA, 28 September
-
Gupta, V.; Gupta, S.; Chang, S.; Stebila, D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of ACM Workshop on Wireless Security (WiSe), Atlanta, GA, USA, 28 September 2002; pp. 87–94.
-
(2002)
Proceedings of ACM Workshop on Wireless Security (WiSe)
, pp. 87-94
-
-
Gupta, V.1
Gupta, S.2
Chang, S.3
Stebila, D.4
-
23
-
-
77954302282
-
Energy efficient scheduling for downlink elastic traffic in wireless networks
-
Lee, J.; Bahk, S. Energy efficient scheduling for downlink elastic traffic in wireless networks. Wirel. Comm. Mobile Comput. 2010, 10, 932–941.
-
(2010)
Wirel. Comm. Mobile Comput
, vol.10
, pp. 932-941
-
-
Lee, J.1
Bahk, S.2
|