-
1
-
-
27344453719
-
Note on Marsaglia's Xorshift Random Number Generators
-
Brent, R.P.: Note on Marsaglia's Xorshift Random Number Generators. Journal of Statistical Software 11(4), 1-5 (2004)
-
(2004)
Journal of Statistical Software
, vol.11
, Issue.4
, pp. 1-5
-
-
Brent, R.P.1
-
2
-
-
50249176295
-
Maximalist cryptography and computation on the WISP UHF RFID tag
-
Chae, M.-J., Yeager, D.J., Smith, J.R., Fu, K.: Maximalist cryptography and computation on the WISP UHF RFID tag. In: Proceedings of the Conference on RFID Security (2007)
-
Proceedings of the Conference on RFID Security (2007)
-
-
Chae, M.-J.1
Yeager, D.J.2
Smith, J.R.3
Fu, K.4
-
4
-
-
10444273896
-
Exponentiation cryptosystems on the IBM PC
-
Comba, P.G.: Exponentiation cryptosystems on the IBM PC. IBM Syst. J. 29, 526-538 (1990)
-
(1990)
IBM Syst. J.
, vol.29
, pp. 526-538
-
-
Comba, P.G.1
-
5
-
-
78049342560
-
Co-Z Addition Formulae and Binary Ladders on Elliptic Curves
-
Mangard, S., Standaert, F.-X. (eds.) CHES 2010. Springer, Heidelberg
-
Goundar, R., Joye, M., Miyaji, A.: Co-Z Addition Formulae and Binary Ladders on Elliptic Curves. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 65-79. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6225
, pp. 65-79
-
-
Goundar, R.1
Joye, M.2
Miyaji, A.3
-
6
-
-
77649245119
-
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Gouvêa, C., López, J.: Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 248-262. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 248-262
-
-
Gouvêa, C.1
López, J.2
-
7
-
-
84937438994
-
Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers
-
Public Key Cryptography
-
Guajardo, J., Blümel, R., Krieger, U., Paar, C.: Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP 430x33x Family of Microcontrollers. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 365-382. Springer, Heidelberg (2001) (Pubitemid 33232955)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1992
, pp. 365-382
-
-
Guajardo, J.1
Blumel, R.2
Krieger, U.3
Paar, C.4
-
8
-
-
35048818581
-
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, pp. 119-132 (2004)
-
(2004)
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
9
-
-
11244267013
-
-
Springer-Verlag New York, Inc., Secaucus
-
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer-Verlag New York, Inc., Secaucus (2003)
-
(2003)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.J.2
Vanstone, S.3
-
10
-
-
79960084103
-
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
-
Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. Springer, Heidelberg
-
Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170-187. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6737
, pp. 170-187
-
-
Hutter, M.1
Joye, M.2
Sierra, Y.3
-
11
-
-
84856110666
-
-
Impinj: Speedway Revolution - Superior Performance Made Easy (2010)
-
(2010)
-
-
-
14
-
-
35248874869
-
The Montgomery Powering Ladder
-
Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. Springer, Heidelberg
-
Joye, M., Yen, S.-M.: The Montgomery Powering Ladder. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291-302. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2523
, pp. 291-302
-
-
Joye, M.1
Yen, S.-M.2
-
15
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
16
-
-
38549171419
-
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor
-
Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. Springer, Heidelberg
-
Lee, Y.K., Verbauwhede, I.: A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 115-127. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4867
, pp. 115-127
-
-
Lee, Y.K.1
Verbauwhede, I.2
-
17
-
-
51249087814
-
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
-
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of International Conference on Information Processing in Sensor Networks - IPSN 2008, St. Louis, Missouri, USA, April 22-24, pp. 245-256 (2008)
-
(2008)
Proceedings of International Conference on Information Processing in Sensor Networks - IPSN 2008, St. Louis, Missouri, USA, April 22-24
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
18
-
-
84890863577
-
-
Springer, Heidelberg
-
Mangard, S., Oswald, M.E., Popp, T.: Power Analysis Attacks - Revealing the Secrets of Smart Cards. Springer, Heidelberg (2007)
-
(2007)
Power Analysis Attacks - Revealing the Secrets of Smart Cards
-
-
Mangard, S.1
Oswald, M.E.2
Popp, T.3
-
20
-
-
38549097587
-
Fast and Secure Elliptic Curve Scalar Multiplication over Prime Fields Using Special Addition Chains
-
ePrint Archive, Report 2006/216
-
Meloni, N.: Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains. In: Cryptology ePrint Archive, Report 2006/216 (2006)
-
(2006)
Cryptology
-
-
Meloni, N.1
-
21
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
22
-
-
84968484435
-
Speeding the Pollard and Elliptic Curve Methods of Factorization
-
Montgomery, P.L.: Speeding the Pollard and Elliptic Curve Methods of Factorization. Mathematics of Computation 48(177), 243-264 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
24
-
-
63649165149
-
A Passively Powered UHF RFID Tag with Sensing and Computation
-
WISP: March
-
Sample, A., Yeager, D., Smith, J.: WISP: A Passively Powered UHF RFID Tag with Sensing and Computation. In: RFID Handbook: Applications, Technology, Security, and Privacy (March 2008)
-
(2008)
RFID Handbook: Applications, Technology, Security, and Privacy
-
-
Sample, A.1
Yeager, D.2
Smith, J.3
-
26
-
-
49949089509
-
Optimizing Multiprecision Multiplication for Public Key Cryptography
-
ePrint Archive, Report 2007/299
-
Scott, M., Szczechowiak, P.: Optimizing Multiprecision Multiplication for Public Key Cryptography. In: Cryptology ePrint Archive, Report 2007/299 (2007), http://eprint.iacr.org/
-
(2007)
Cryptology
-
-
Scott, M.1
Szczechowiak, P.2
-
27
-
-
25444493656
-
RFID-based techniques for human-activity detection
-
Smith, J.R., Fishkin, K.P., Jiang, B., Mamishev, A., Philipose, M., Rea, A.D., Roy, S., Sundara-Rajan, K.: RFID-based techniques for human-activity detection. Commun. ACM 48, 39-44 (2005)
-
(2005)
Commun. ACM
, vol.48
, pp. 39-44
-
-
Smith, J.R.1
Fishkin, K.P.2
Jiang, B.3
Mamishev, A.4
Philipose, M.5
Rea, A.D.6
Roy, S.7
Sundara-Rajan, K.8
-
28
-
-
49949100301
-
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
-
Verdone, R. (ed.) EWSN 2008. Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
29
-
-
84856120201
-
-
Texas Instruments. May
-
Texas Instruments. MSP-FET430UIF (May 2010)
-
(2010)
MSP-FET430UIF
-
-
-
31
-
-
38149038702
-
On Privacy Models for RFID
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 68-87
-
-
Vaudenay, S.1
-
32
-
-
73249140921
-
Neural WISP: A Wirelessly Powered Neural Interface with 1-m Range
-
Yeager, D., Holleman, J., Prasad, R., Smith, J., Otis, B.: Neural WISP: A Wirelessly Powered Neural Interface With 1-m Range. IEEE Transactions on Biomedical Circuits and Systems 3(6), 379-387 (2009)
-
(2009)
IEEE Transactions on Biomedical Circuits and Systems
, vol.3
, Issue.6
, pp. 379-387
-
-
Yeager, D.1
Holleman, J.2
Prasad, R.3
Smith, J.4
Otis, B.5
|