-
1
-
-
85034497704
-
Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor
-
In: Odlyzko, A.M. (ed.) Springer, Heidelberg
-
Barrett, P.: Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311-323. Springer, Heidelberg (1987)
-
(1987)
CRYPTO 1986. LNCS
, vol.263
, pp. 311-323
-
-
Barrett, P.1
-
2
-
-
33745965912
-
Curve25519: New diffie-hellman speed records
-
In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) Springer, Heidelberg
-
Bernstein, D.J.: Curve25519: New Diffie-Hellman Speed Records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207-228. Springer, Heidelberg (2006), http://cr.yp.to/papers.html#curve25519
-
(2006)
PKC 2006. LNCS
, vol.3958
, pp. 207-228
-
-
Bernstein . D, J.1
-
3
-
-
48249087677
-
The salsa20 family of stream ciphers
-
In: Robshaw, M., Billet, O. (eds.) Springer, Heidelberg
-
Bernstein, D.J.: The Salsa20 family of stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 84-97. Springer, Heidelberg (2008), http://cr.yp.to/papers.html#salsafamily
-
(2008)
New Stream Cipher Designs. LNCS
, vol.4986
, pp. 84-97
-
-
Bernstein . D, J.1
-
4
-
-
84866017720
-
The security impact of a new cryptographic library
-
In: Hevia, A., Neven, G. (eds.) Springer, Heidelberg
-
Bernstein, D.J., Lange, T., Schwabe, P.: The Security Impact of a New Cryptographic Library. In: Hevia, A., Neven, G. (eds.) LATINCRYPT 2012. LNCS, vol. 7533, pp. 159-176. Springer, Heidelberg (2012), http://cryptojedi.org/ papers/#coolnacl
-
(2012)
LATINCRYPT 2012. LNCS
, vol.7533
, pp. 159-176
-
-
Bernstein, D.J.1
Lange, T.2
Schwabe, P.3
-
5
-
-
26444458893
-
The poly1305-aes message-authentication code
-
In: Gilbert, H., Handschuh, H. (eds.) Springer, Heidelberg
-
Bernstein, D.J.: The Poly1305-AES Message-Authentication Code. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 32-49. Springer, Heidelberg (2005), http://cr.yp.to/papers.html#poly1305
-
(2005)
FSE 2005. LNCS
, vol.3557
, pp. 32-49
-
-
Bernstein . D, J.1
-
6
-
-
45449095464
-
Twisted edwards curves
-
In: Vaudenay, S. (ed.) Springer, Heidelberg
-
Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards Curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389-405. Springer, Heidelberg (2008), http://cr.yp.to/papers.html#twisted
-
(2008)
AFRICACRYPT 2008. LNCS
, vol.5023
, pp. 389-405
-
-
Bernstein, D.J.1
Birkner, P.2
Joye, M.3
Lange, T.4
Peters, C.5
-
7
-
-
80053515348
-
High-speed highsecurity signatures
-
In: Preneel, B., Takagi, T. (eds.) Springer, Heidelberg; see also full version [8]
-
Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed highsecurity signatures. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 124-142. Springer, Heidelberg (2011); see also full version [8]
-
(2011)
CHES 2011. LNCS
, vol.6917
, pp. 124-142
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.-Y.5
-
8
-
-
84884478474
-
High-speed highsecurity signatures
-
see also short version [7], http://cryptojedi.org/papers/#ed25519
-
Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.-Y.: High-speed highsecurity signatures. Journal of Cryptographic Engineering 2(2), 77-89 (2012) see also short version [7], http://cryptojedi.org/papers/#ed25519
-
(2012)
Journal of Cryptographic Engineering
, vol.2
, Issue.2
, pp. 77-89
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.-Y.5
-
10
-
-
84866032435
-
NEON crypto
-
In: Prouff, E., Schaumont, P. (eds.) Springer, Heidelberg
-
Bernstein, D.J., Schwabe, P.: NEON crypto. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 320-339. Springer, Heidelberg (2012), http://cryptojedi.org/papers/#neoncrypto
-
(2012)
CHES 2012. LNCS
, vol.7428
, pp. 320-339
-
-
Bernstein, D.J.1
Schwabe, P.2
-
12
-
-
84884887017
-
-
European Network of Excellence in Cryptology II (accessed January 18, 2013)
-
European Network of Excellence in Cryptology II, http://www.ecrypt.eu. org/index.html (accessed January 18, 2013)
-
-
-
-
13
-
-
84884827268
-
-
8051 and AVR Cryptolibrary
-
Efton. 8051 and AVR Cryptolibrary, http://www.efton.sk/crypt/index.htm
-
-
-
-
14
-
-
37149018890
-
A survey of lightweight-cryptography implementations
-
ISSN 0740-7475
-
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A Survey of Lightweight-Cryptography Implementations. IEEE Design & Test of Computers -Design and Test of ICs for Secure Embedded Computing 24(6), 522-533 (2007) ISSN 0740-7475
-
(2007)
IEEE Design & Test of Computers -Design and Test of ICs for Secure Embedded Computing
, vol.24
, Issue.6
, pp. 522-533
-
-
Eisenbarth, T.1
Kumar, S.2
Paar, C.3
Poschmann, A.4
Uhsadel, L.5
-
15
-
-
84884838294
-
-
Das Labor e.V. AVR-Crypto-Lib
-
Das Labor e.V. AVR-Crypto-Lib, http://www.das-labor.org/wiki/AVR-Crypto- Lib/en
-
-
-
-
16
-
-
35048818581
-
Comparing elliptic curve cryptography and rsa on 8-bit cpus
-
In: Joye, M., Quisquater, J.-J. (eds.) Springer, Heidelberg
-
Gura, N., Patel, A.,Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
(2004)
CHES 2004. LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
17
-
-
58349103020
-
Twisted edwards curves revisited
-
In: Pieprzyk, J. (ed.) Springer, Heidelberg
-
Hisil, H.,Wong, K.K.-H., Carter, G., Dawson, E.: Twisted edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326-343. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/522/
-
(2008)
ASIACRYPT 2008. LNCS
, vol.5350
, pp. 326-343
-
-
Hisil, H.1
Wong, K.K.-H.2
Carter, G.3
Dawson, E.4
-
18
-
-
77958067819
-
True random number generation on an Atmel AVR microcontroller
-
IEEE
-
Hlavac, J., Lorencz, R., Hadacek, M.: True random number generation on an Atmel AVR microcontroller. In: 2010 2nd International Conference on Computer Engineering and Technology (ICCET), vol. 2, pp. 493-495. IEEE (2010)
-
(2010)
2010 2nd International Conference on Computer Engineering and Technology (ICCET)
, vol.2
, pp. 493-495
-
-
Hlavac, J.1
Lorencz, R.2
Hadacek, M.3
-
19
-
-
80053471866
-
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
-
In: Preneel, B., Takagi, T. (eds.) Springer, Heidelberg
-
Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 459-474. Springer, Heidelberg (2011)
-
(2011)
CHES 2011. LNCS
, vol.6917
, pp. 459-474
-
-
Hutter, M.1
Wenger, E.2
-
20
-
-
0001464763
-
Multiplication of multidigit numbers on automata
-
Translated from Doklady Akademii Nauk SSSR 145(2), 293-294 (July 1962)
-
Karatsuba, A., Ofman, Y.: Multiplication of Multidigit Numbers on Automata. Soviet Physics-Doklady 7, 595-596 (1963); Translated from Doklady Akademii Nauk SSSR 145(2), 293-294 (July 1962)
-
(1963)
Soviet Physics-Doklady
, vol.7
, pp. 595-596
-
-
Karatsuba, A.1
Ofman, Y.2
-
21
-
-
70350579484
-
-
IACR Cryptology ePrint Archive, report 2008/442 (October
-
Kargl, A., Pyka, S., Seuschek, H.: Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography. IACR Cryptology ePrint Archive, report 2008/442 (October 2008), http://eprint.iacr.org/2008/442
-
(2008)
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
-
-
Kargl, A.1
Pyka, S.2
Seuschek, H.3
-
22
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, rsa, dss, and other systems
-
In: Koblitz, N. (ed.) Springer, Heidelberg
-
Kocher, P.C.: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104-113. Springer, Heidelberg (1996)
-
(1996)
CRYPTO 1996. LNCS
, vol.1109
, pp. 104-113
-
-
Kocher . P, C.1
-
24
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
St. Louis, Missouri, USA, MO, April 22-24(April
-
Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, MO, April 22-24, pp. 245-256 (April 2008)
-
(2008)
Proceedings of International Conference on Information Processing in Sensor Networks, IPSN 2008
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
26
-
-
51549093359
-
Efficient implementation of estream ciphers on 8-bit avr microcontrollers
-
June
-
Meiser, G., Eisenbarth, T., Lemke-Rust, K., Paar, C.: Efficient Implementation of eSTREAM Ciphers on 8-bit AVR Microcontrollers. In: International Symposium on Industrial Embedded Systems, SIES 2008, pp. 58-66 (June 2008)
-
(2008)
International Symposium on Industrial Embedded Systems, SIES 2008
, pp. 58-66
-
-
Meiser, G.1
Eisenbarth, T.2
Lemke-Rust, K.3
Paar, C.4
-
27
-
-
84968484435
-
Speeding the pollard and elliptic curve methods of factorization
-
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48(177), 243-264 (1987), http://www.ams.org/journals/mcom/1987-48-177/S0025-5718-1987-0866113-7/ S0025-5718-1987-0866113-7.pdf
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery . P, L.1
-
28
-
-
84884824862
-
-
National Institute of Standards and Technology (NIST). FIPS-180-3: Secure Hash Standard (October 2008)
-
National Institute of Standards and Technology (NIST). FIPS-180-3: Secure Hash Standard (October 2008), http://www.itl.nist.gov/fipspubs/
-
-
-
-
29
-
-
84884854430
-
-
Center of Mathematical Modeling Sigma. CRS-AVR010X-ECC
-
Center of Mathematical Modeling Sigma. CRS-AVR010X-ECC, http://www.cmmsigma.eu/products/crypto/crs-avr010x.en.html
-
-
-
-
31
-
-
25144433462
-
Addition chains of vectors (problem 5125)
-
Straus, E.G.: Addition chains of vectors (problem 5125). American Mathematical Monthly 70, 806-808 (1964), http://cr.yp.to/bib/1964/straus.html
-
(1964)
American Mathematical Monthly
, vol.70
, pp. 806-808
-
-
Straus . E, G.1
-
32
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
In: Verdone, R. (ed.) Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
EWSN 2008. LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
33
-
-
37149040069
-
Enabling full-size public-key algorithms on 8-bit sensor nodes
-
In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) Springer, Heidelberg
-
Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 73-86. Springer, Heidelberg (2007)
-
(2007)
ESAS 2007. LNCS
, vol.4572
, pp. 73-86
-
-
Uhsadel, L.1
Poschmann, A.2
Paar, C.3
-
34
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors (short paper)
-
In: Ning, P., Qing, S., Li, N. (eds.) Springer, Heidelberg
-
Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
-
(2006)
ICICS 2006. LNCS
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
35
-
-
84884889322
-
-
XBX: eXternal Benchmarking eXtension (accessed January 31, 2013)
-
Wenzel-Benner, C., Graf, J.: XBX: eXternal Benchmarking eXtension, http://xbx.das-labor.org/trac/wiki/WikiStart (accessed January 31, 2013)
-
-
-
Wenzel-Benner, C.1
Graf, J.2
|