-
1
-
-
84879868700
-
Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm, ECDSA
-
American National Standards Institute (ANSI).
-
American National Standards Institute (ANSI). AMERICAN NATIONAL STANDARD X9.62-2005. Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm, ECDSA (2005)
-
(2005)
AMERICAN NATIONAL STANDARD X9.62-2005
-
-
-
3
-
-
23044441343
-
-
Chapman & Hall/CRC, Boca Raton
-
Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F. (eds.): Handbook of Elliptic and Hyperelliptic Curve Cryptography. Chapman & Hall/CRC, Boca Raton (2006)
-
(2006)
Handbook of Elliptic and Hyperelliptic Curve Cryptography
-
-
Cohen, H.1
Frey, G.2
Avanzi, R.3
Doche, C.4
Lange, T.5
Nguyen, K.6
Vercauteren, F.7
-
4
-
-
10444273896
-
Exponentiation cryptosystems on the IBM PC
-
Comba, P.: Exponentiation cryptosystems on the IBM PC. IBM Systems Journal, 526-538 (1990)
-
(1990)
IBM Systems Journal
, pp. 526-538
-
-
Comba, P.1
-
5
-
-
84880293917
-
Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292-302. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 292-302
-
-
Coron, J.-S.1
-
7
-
-
84857697276
-
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
-
Naccache, D. (ed.) Quisquater Festschrift. Springer, Heidelberg
-
Fan, J., Verbauwhede, I.: An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost. In: Naccache, D. (ed.) Quisquater Festschrift. LNCS, vol. 6805, pp. 265-282. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.6805
, pp. 265-282
-
-
Fan, J.1
Verbauwhede, I.2
-
8
-
-
77649245119
-
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller
-
Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. Springer, Heidelberg
-
Gouvêa, C.P.L., López, J.: Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 248-262. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5922
, pp. 248-262
-
-
Gouvêa, C.P.L.1
López, J.2
-
9
-
-
84866035505
-
Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller
-
Gouvêa, C.P.L., Oliveira, L., López, J.: Efficient Software Implementation of Public-Key Cryptography on Sensor Networks Using the MSP430X Microcontroller. Journal of Cryptographic Engineering 2, 19-29 (2012)
-
(2012)
Journal of Cryptographic Engineering
, vol.2
, pp. 19-29
-
-
Gouvêa, C.P.L.1
Oliveira, L.2
López, J.3
-
11
-
-
70350059460
-
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage
-
Guo, X., Schaumont, P.: Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage. In: DATE, pp. 454-459 (2009)
-
(2009)
DATE
, pp. 454-459
-
-
Guo, X.1
Schaumont, P.2
-
12
-
-
35048818581
-
Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs. In: CHES, pp. 119-132 (2004)
-
(2004)
CHES
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
14
-
-
70350639755
-
ECC Is Ready for RFID - A Proof in Silicon
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Hein, D., Wolkerstorfer, J., Felber, N.: ECC Is Ready for RFID - A Proof in Silicon. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 401-413. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
15
-
-
79960084103
-
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
-
Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. Springer, Heidelberg
-
Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 170-187. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6737
, pp. 170-187
-
-
Hutter, M.1
Joye, M.2
Sierra, Y.3
-
18
-
-
76549084659
-
Hardware/Software Co-Design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems
-
Koschuch, M., Großschädl, J., Page, D., Grabher, P., Hudler, M., Krüger, M.: Hardware/Software Co-Design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. In: Workshop on Embedded Systems Security, pp. 63-79 (2009)
-
(2009)
Workshop on Embedded Systems Security
, pp. 63-79
-
-
Koschuch, M.1
Großschädl, J.2
Page, D.3
Grabher, P.4
Hudler, M.5
Krüger, M.6
-
20
-
-
54049143316
-
Elliptic-Curve-Based Security Processor for RFID
-
Lee, Y.K., Sakiyama, K., Batina, L., Verbauwhede, I.: Elliptic-Curve-Based Security Processor for RFID. IEEE Transactions on Computers 57(11), 1514-1527 (2008)
-
(2008)
IEEE Transactions on Computers
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
22
-
-
84947913604
-
m) without Precomputation
-
Koç, Ç.K., Paar, C. (eds.) CHES 1999. Springer, Heidelberg
-
m) without Precomputation. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 316-327. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1717
, pp. 316-327
-
-
López, J.1
Dahab, R.2
-
23
-
-
77649257869
-
-
National Institute of Standards and Technology (NIST). DSS
-
National Institute of Standards and Technology (NIST). FIPS-186-3: Digital Signature Standard, DSS (2009)
-
(2009)
FIPS-186-3: Digital Signature Standard
-
-
-
24
-
-
84879874645
-
-
Olivier Girard. openMSP430 (2013), http://opencores.org/project, openmsp430
-
(2013)
openMSP430
-
-
Girard, O.1
-
25
-
-
33646775803
-
Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Öztürk, E., Sunar, B., Savaş, E.: Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 92-106. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 92-106
-
-
Öztürk, E.1
Sunar, B.2
Savaş, E.3
-
26
-
-
49949100301
-
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
-
Verdone, R. (ed.) EWSN 2008. Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
28
-
-
49949083706
-
Elliptic Curve Cryptography-based Access Control in Sensor Networks
-
Wang, H., Sheng, B., Li, Q.: Elliptic Curve Cryptography-based Access Control in Sensor Networks. International Journal of Security and Networks, 127-137 (2006)
-
(2006)
International Journal of Security and Networks
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
29
-
-
84862152511
-
Exploring the design space of prime field vs. Binary field ECC-hardware implementations
-
Laud, P. (ed.) NordSec 2011. Springer, Heidelberg
-
Wenger, E., Hutter, M.: Exploring the design space of prime field vs. binary field ECC-hardware implementations. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 256-271. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7161
, pp. 256-271
-
-
Wenger, E.1
Hutter, M.2
-
30
-
-
52949086079
-
Is Elliptic-Curve Cryptography Suitable for Small Devices?
-
Wolkerstorfer, J.: Is Elliptic-Curve Cryptography Suitable for Small Devices? In: Workshop on RFID and Lightweight Crypto, pp. 78-91 (2005)
-
(2005)
Workshop on RFID and Lightweight Crypto
, pp. 78-91
-
-
Wolkerstorfer, J.1
-
31
-
-
21644488714
-
-
Website
-
ZigBee Alliance. The ZigBee Alliance Website, http://www.zigbee.org/
-
The ZigBee Alliance
-
-
|