-
1
-
-
11244317648
-
A Public-key Cryptographic Processor for RSA and ECC
-
H. Eberle, N. Gura, S.C. Shantz, V. Gupta, L. Rarick, "A Public-key Cryptographic Processor for RSA and ECC", Application-Specific Systems, Architectures and Processors, 2004. Page(s): 98-110
-
(2004)
Application-Specific Systems, Architectures and Processors
, pp. 98-110
-
-
Eberle, H.1
Gura, N.2
Shantz, S.C.3
Gupta, V.4
Rarick, L.5
-
2
-
-
84857217819
-
An Architecture for Variable Dimensional Finite Field GF(2m) Arithmetic Operations for Elliptic Curve Cryptography
-
August
-
M. I. Faisal, Z. Jeddi, E. Amini and M. Bayoumi, "An Architecture for Variable Dimensional Finite Field GF(2m) Arithmetic Operations for Elliptic Curve Cryptography", Journal of Low Power Electronics, Volume 7, Number 3, August 2011 , pp. 314-327(14)
-
(2011)
Journal of Low Power Electronics
, vol.7
, Issue.3
-
-
Faisal, M.I.1
Jeddi, Z.2
Amini, E.3
Bayoumi, M.4
-
3
-
-
60649097378
-
Low-power hardware implementation of ECC processor suitable for low-cost RFID tags
-
ICSICT
-
P. Luo, X. Wang, J. Feng, Y. Xu ,"Low-power hardware implementation of ECC processor suitable for low-cost RFID tags", Solid-State and Integrated-Circuit Technology, ICSICT 2008.
-
(2008)
Solid-State and Integrated-Circuit Technology
-
-
Luo, P.1
Wang, X.2
Feng, J.3
Xu, Y.4
-
4
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
Y. K. Lee, K. Sakiyama, L. Batina, I. Verbauwhede, "Elliptic-Curve- Based Security Processor for RFID", Computers, IEEE Transactions on Volume: 57, Issue: 11, 2008 , Page(s): 1514-1527
-
(2008)
Computers, IEEE Transactions on
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
5
-
-
34548815120
-
Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
-
Graz, Austria, July
-
S. S. Kumar and C. Paar, "Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?" In Proceedings of Workshop on RFID Security, page 19, Graz, Austria, July 2006.
-
(2006)
Proceedings of Workshop on RFID Security
, pp. 19
-
-
Kumar, S.S.1
Paar, C.2
-
6
-
-
34548838049
-
Public-Key Cryptography on the Top of a Needle
-
May
-
L. Batina, N. Mentens, K. Sakiyama, B. Preneel, and I. Verbauwhede, "Public-Key Cryptography on the Top of a Needle," In Proceedings of the IEEE International Symposium on Circuits and Systems, ISCAS'07, pp. 1831-1834, May 2007.
-
(2007)
Proceedings of the IEEE International Symposium on Circuits and Systems, ISCAS'07
, pp. 1831-1834
-
-
Batina, L.1
Mentens, N.2
Sakiyama, K.3
Preneel, B.4
Verbauwhede, I.5
-
7
-
-
34250624636
-
-
Ph.D.dissertation, ECE Department, Worcester Polytechnic Institute, Worcester, Massachusetts, USA, May
-
J. P. Kaps, "Cryptography for Ultra-Low Power Devices," Ph.D.dissertation, ECE Department, Worcester Polytechnic Institute, Worcester, Massachusetts, USA, May 2006.
-
(2006)
Cryptography for Ultra-Low Power Devices
-
-
Kaps, J.P.1
-
8
-
-
33646775803
-
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
-
Proceedings of the sixth International Workshop on Cryptographic Hardware in Embedded Systems (CHES), Springer-Verlag, Aug
-
E. Öztürk, B. Sunar, and E. Savaş, "Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic," In Proceedings of the sixth International Workshop on Cryptographic Hardware in Embedded Systems (CHES), volume 3156 of Lecture Notes in Computer Science, pp. 92-106. Springer-Verlag, Aug 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 92-106
-
-
Öztürk, E.1
Sunar, B.2
Savaş, E.3
-
9
-
-
33646812572
-
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
-
G. Gaubatz, J. P. Kaps, E. Öztürk, and B. Sunar, "State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks," In Proceedings of the 3rd IEEE international conference on pervasive computing and communications workshops, March 2005.
-
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications Workshops, March 2005
-
-
Gaubatz, G.1
Kaps, J.P.2
Öztürk, E.3
Sunar, B.4
-
11
-
-
34548833924
-
Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID
-
M.-L. Hsia, O. T.-C. Chen, "Low-Complexity Encryption Using Redundant Bits and Adaptive Frequency Rates in RFID', ISCAS 2007.
-
ISCAS 2007
-
-
Hsia, M.-L.1
Chen, O.T.-C.2
-
13
-
-
84867836421
-
-
http://en.wikipedia.org/wiki/Brute-force-attack
-
-
-
-
16
-
-
62949102882
-
Hardware Results for Selected Stream Cipher Candidates
-
T. Good and M. Benaissa, "Hardware Results for Selected Stream Cipher Candidates", eSTREAM http://www.ecrypt.eu.org/stream/papersdir/2007/ 023.pdf )
-
eSTREAM
-
-
Good, T.1
Benaissa, M.2
-
17
-
-
84864194805
-
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm
-
D. Engels, M. O. Saarinen and E.M. Smith. "The Hummingbird-2 Lightweight Authenticated Encryption Algorithm." RFIDSec 2011
-
RFIDSec 2011
-
-
Engels, D.1
Saarinen, M.O.2
Smith, E.M.3
|