메뉴 건너뛰기




Volumn 74 LNICST, Issue , 2012, Pages 623-634

Smart Elliptic Curve Cryptography for Smart Dust

Author keywords

Ad hoc network; arithmetic in finite fields; elliptic curve cryptography; endomorphism; performance evaluation

Indexed keywords

ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOGRAPHY(ECC); ENDOMORPHISM; ENVIRONMENTAL MONITORING; FINITE FIELDS; PERFORMANCE EVALUATION; RESOURCE-RESTRICTED DEVICES; SECURITY AND PRIVACY ISSUES;

EID: 84885002111     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-29222-4_44     Document Type: Conference Paper
Times cited : (10)

References (26)
  • 4
    • 53449083656 scopus 로고    scopus 로고
    • Crossbow Technology, Inc, January
    • Crossbow Technology, Inc.: MICA2DOT Wireless Microsensor Mote. Data sheet (January 2006), http://www.xbow.com/Products/Product pdf files/Wireless pdf/MICA2DOT Datasheet.pdf
    • (2006) MICA2DOT Wireless Microsensor Mote. Data sheet
  • 6
    • 79957797091 scopus 로고    scopus 로고
    • Faster point multiplication on elliptic curves with efficient endomorphisms
    • Springer, Heidelberg, In: Kilian, J. (ed.)
    • Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190-200. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 190-200
    • Gallant, R.P.1    Lambert, R.J.2    Vanstone, S.A.3
  • 8
    • 47749100816 scopus 로고    scopus 로고
    • Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor
    • IEEE Computer Society Press, Los Alamitos
    • Großschädl, J., Tillich, S., Szekely, A.: Performance evaluation of instruction set extensions for long integer modular arithmetic on a SPARC V8 processor. In: Proceedings of the 10th Euromicro Conference on Digital System Design (DSD 2007), pp. 680-689. IEEE Computer Society Press, Los Alamitos (2007)
    • (2007) Proceedings of the 10th Euromicro Conference on Digital System Design (DSD 2007) , pp. 680-689
    • Großschädl, J.1    Tillich, S.2    Szekely, A.3
  • 9
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and RSA on 8-bit CPUs
    • Springer, Heidelberg, In: Joye, M., Quisquater, J.J. (eds.)
    • Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
    • (2004) CHES 2004. LNCS , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.S.3    Eberle, H.4    Chang Shantz, S.5
  • 11
    • 22544448109 scopus 로고    scopus 로고
    • A reusable Duff device
    • Holly, R.: A reusable Duff device. Dr. Dobb's Journal 30(8), 73-74 (2005)
    • (2005) Dr. Dobb's Journal , vol.30 , Issue.8 , pp. 73-74
    • Holly, R.1
  • 12
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • Hubaux, J.P., Ĉapkun, S., Luo, J.: The security and privacy of smart vehicles. IEEE Security & Privacy 2(3), 49-55 (2004)
    • (2004) IEEE Security & Privacy , vol.2 , Issue.3 , pp. 49-55
    • Hubaux, J.P.1    Ĉapkun, S.2    Luo, J.3
  • 14
    • 0030172012 scopus 로고    scopus 로고
    • Analyzing and comparing Montgomery multiplication algorithms
    • Koç, Ç.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3), 26-33 (1996)
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, C.K.1    Acar, T.2    Kaliski, B.S.3
  • 15
    • 33749643165 scopus 로고    scopus 로고
    • Threats to security in DSRC/WAVE
    • Springer, Heidelberg, In: Kunz, T., Ravi, S.S. (eds.)
    • Laurendeau, C., Barbeau, M.: Threats to security in DSRC/WAVE. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol. 4104, pp. 266-279. Springer, Heidelberg (2006)
    • (2006) ADHOC-NOW 2006. LNCS , vol.4104 , pp. 266-279
    • Laurendeau, C.1    Barbeau, M.2
  • 16
    • 70350585044 scopus 로고    scopus 로고
    • Energy-efficient implementation of ECDH key exchange for wireless sensor networks
    • Springer, Heidelberg, In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J., Quisquater, J.J. (eds.)
    • Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.H., Mitchell, C.J., Quisquater, J.J. (eds.) WISTP 2009. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
    • (2009) WISTP 2009. LNCS , vol.5746 , pp. 112-127
    • Lederer, C.1    Mader, R.2    Koschuch, M.3    Großschädl, J.4    Szekely, A.5    Tillich, S.6
  • 20
    • 0012584245 scopus 로고    scopus 로고
    • Tech. Rep. CORR-99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada
    • Solinas, J.A.: Generalized Mersenne numbers. Tech. Rep. CORR-99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada (1999)
    • (1999) Generalized Mersenne numbers
    • Solinas, J.A.1
  • 21
    • 84884991648 scopus 로고    scopus 로고
    • Standards for Efficient Cryptography Group (SECG): SEC 1, version 1.7 November
    • Standards for Efficient Cryptography Group (SECG): SEC 1: Elliptic Curve Cryptography. Working draft, version 1.7 (November 2006), http://www.secg.org/download/aid-631/sec1_1point7.pdf
    • (2006) Elliptic Curve Cryptography. Working draft
  • 22
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • Springer, Heidelberg, In: Verdone, R. (ed.)
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
    • (2008) EWSN 2008. LNCS , vol.4913 , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 23
    • 70350617038 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
    • In: Wolf, T., Parameswaran, S. (eds.)
    • Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007) , pp. 11-16
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 25
    • 85008955601 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors
    • Springer, Heidelberg, In: Ning, P., Qing, S., Li, N. (eds.)
    • Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
    • (2006) ICICS 2006. LNCS , vol.4307 , pp. 519-528
    • Wang, H.1    Li, Q.2
  • 26
    • 0035121216 scopus 로고    scopus 로고
    • Smart dust: Communicating with a cubic-millimeter computer
    • Warneke, B., Last, M., Liebowitz, B., Pister, K.S.: Smart dust: Communicating with a cubic-millimeter computer. Computer 34(1), 44-51 (2001)
    • (2001) Computer , vol.34 , Issue.1 , pp. 44-51
    • Warneke, B.1    Last, M.2    Liebowitz, B.3    Pister, K.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.