-
2
-
-
67149094731
-
A hardware analysis of twisted Edwards curves for an elliptic curve cryptosystem
-
Reconfigurable Computing: Architectures, Tools and Applications - ARC 2009, Springer Verlag
-
B. Baldwin, R. Moloney, A. Byrne, G. McGuire, and W. P. Marnane. A hardware analysis of twisted Edwards curves for an elliptic curve cryptosystem. In Reconfigurable Computing: Architectures, Tools and Applications - ARC 2009, vol. 5453 of Lecture Notes in Computer Science, pp. 355-361. Springer Verlag, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5453
, pp. 355-361
-
-
Baldwin, B.1
Moloney, R.2
Byrne, A.3
McGuire, G.4
Marnane, W.P.5
-
3
-
-
33745965912
-
Curve25519: New Diffie-Hellman speed records
-
Public Key Cryptography - PKC 2006, Springer Verlag
-
D. J. Bernstein. Curve25519: New Diffie-Hellman speed records. In Public Key Cryptography - PKC 2006, vol. 3958 of Lecture Notes in Computer Science, pp. 207-228. Springer Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3958
, pp. 207-228
-
-
Bernstein, D.J.1
-
4
-
-
45449095464
-
Twisted Edwards curves
-
Progress in Cryptology - AFRICACRYPT 2008, Springer Verlag
-
D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters. Twisted Edwards curves. In Progress in Cryptology - AFRICACRYPT 2008, vol. 5023 of Lecture Notes in Computer Science, pp. 389-405. Springer Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5023
, pp. 389-405
-
-
Bernstein, D.J.1
Birkner, P.2
Joye, M.3
Lange, T.4
Peters, C.5
-
5
-
-
38149061268
-
Faster addition and doubling on elliptic curves
-
Advances in Cryptology - ASIACRYPT 2007, Springer Verlag
-
D. J. Bernstein and T. Lange. Faster addition and doubling on elliptic curves. In Advances in Cryptology - ASIACRYPT 2007, vol. 4833 of Lecture Notes in Computer Science, pp. 29-50. Springer Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4833
, pp. 29-50
-
-
Bernstein, D.J.1
Lange, T.2
-
8
-
-
84877962069
-
-
M.Sc. Thesis, Department of Electrical Engineering (ESAT), Katholieke Universiteit Leuven, Heverlee, Belgium
-
A. Coyette. Embedded Security for Car Telematics and Infotainment. M.Sc. Thesis, Department of Electrical Engineering (ESAT), Katholieke Universiteit Leuven, Heverlee, Belgium, 2012.
-
(2012)
Embedded Security for Car Telematics and Infotainment
-
-
Coyette, A.1
-
9
-
-
84875716581
-
-
Data sheet, available online at Jan.
-
Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet, available online at http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf, Jan. 2006.
-
(2006)
MICAz Wireless Measurement System
-
-
-
12
-
-
0242277358
-
Architectural enhancements for Montgomery multiplication on embedded RISC processors
-
Applied Cryptography and Network Security - ACNS 2003, Springer Verlag
-
J. Großschädl and G.-A. Kamendje. Architectural enhancements for Montgomery multiplication on embedded RISC processors. In Applied Cryptography and Network Security - ACNS 2003, vol. 2846 of Lecture Notes in Computer Science, pp. 418-434. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2846
, pp. 418-434
-
-
Großschädl, J.1
Kamendje, G.-A.2
-
13
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
Cryptographic Hardware and Embedded Systems - CHES 2004, Springer Verlag
-
N. Gura, A. Patel, A. S. Wander, H. Eberle, and S. Chang Shantz. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems - CHES 2004, vol. 3156 of Lecture Notes in Computer Science, pp. 119-132. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.S.3
Eberle, H.4
Chang Shantz, S.5
-
15
-
-
58349103020
-
Twisted Edwards curves revisited
-
Advances in Cryptology - ASIACRYPT 2008, Springer Verlag
-
H. Hişil, K. K.-H. Wong, G. Carter, and E. Dawson. Twisted Edwards curves revisited. In Advances in Cryptology - ASIACRYPT 2008, vol. 5350 of Lecture Notes in Computer Science, pp. 326-343. Springer Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5350
, pp. 326-343
-
-
Hişil, H.1
Wong, K.K.-H.2
Carter, G.3
Dawson, E.4
-
17
-
-
0030172012
-
Analyzing and comparing montgomery multiplication algorithms
-
Ç. K. Koç, T. Acar, and B. S. Kaliski. Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro, 16(3):26-33, June 1996. (Pubitemid 126530214)
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koc, C.K.1
Acar, T.2
Kaliski Jr., B.S.3
-
18
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Information Security Theory and Practice - WISTP 2009, Springer Verlag
-
C. Lederer, R. Mader, M. Koschuch, J. Großschädl, A. Szekely, and S. Tillich. Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In Information Security Theory and Practice - WISTP 2009, vol. 5746 of Lecture Notes in Computer Science, pp. 112-127. Springer Verlag, 2009.
-
(2009)
Lecture Notes in Computer Science
, vol.5746
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschädl, J.4
Szekely, A.5
Tillich, S.6
-
20
-
-
84966243285
-
Modular multiplication without trial division
-
Apr.
-
P. L. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, Apr. 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.L.1
-
21
-
-
0013145165
-
-
White paper, available online at July
-
National Institute of Standards and Technology (NIST). Recommended Elliptic Curves for Federal Government Use. White paper, available online at http://csrc.nist.gov/encryption/dss/ecdsa/NISTReCur.pdf, July 1999.
-
(1999)
Recommended Elliptic Curves for Federal Government Use
-
-
-
22
-
-
4243082091
-
Security in wireless sensor networks
-
June
-
A. Perrig, J. A. Stankovic, and D. Wagner. Security in wireless sensor networks. Communications of the ACM, 47(6):53-57, June 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.A.2
Wagner, D.3
-
23
-
-
56949088196
-
A survey of security issues in wireless sensor networks
-
Apr.
-
Y. Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys & Tutorials, 8(2):2-23, Apr. 2006.
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.2
, pp. 2-23
-
-
Wang, Y.1
Attebury, G.2
Ramamurthy, B.3
|