-
1
-
-
0036688074
-
A survey on sensor networks
-
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102-114 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
2
-
-
77953034949
-
Efficient implementation of elliptic curve cryptography in wireless sensors
-
Aranha, D.F., Dahab, R., López, J.C., Oliveira, L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications 4(2), 169-187 (2010)
-
(2010)
Advances in Mathematics of Communications
, vol.4
, Issue.2
, pp. 169-187
-
-
Aranha, D.F.1
Dahab, R.2
López, J.C.3
Oliveira, L.B.4
-
5
-
-
33745965912
-
Curve25519: New Diffie-Hellman speed records
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Bernstein, D.J.: Curve25519: New Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207-228. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3958
, pp. 207-228
-
-
Bernstein, D.J.1
-
6
-
-
84893782491
-
-
Source code June
-
CertiVox Corporation. CertiVox MIRACL SDK. Source code (June 2012), http://www.certivox.com
-
(2012)
CertiVox MIRACL SDK
-
-
-
7
-
-
84878002886
-
Twisted Edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes
-
Xu, S., Zhao, Y. (eds.) ACM Press
-
Chu, D., Großschädl, J., Liu, Z., Müller, V., Zhang, Y.: Twisted Edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes. In: Xu, S., Zhao, Y. (eds.) Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography (AsiaPKC 2013), pp. 39-44. ACM Press (2013)
-
(2013)
Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography (AsiaPKC 2013)
, pp. 39-44
-
-
Chu, D.1
Großschädl, J.2
Liu, Z.3
Müller, V.4
Zhang, Y.5
-
8
-
-
84893741731
-
-
January
-
Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
-
(2006)
MICAz Wireless Measurement System. Data Sheet
-
-
-
9
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
IEEE Computer Society Press
-
de Meulenaer, G., Gosset, F., Standaert, F.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), pp. 580-585. IEEE Computer Society Press (2008)
-
(2008)
Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008)
, pp. 580-585
-
-
De Meulenaer, G.1
Gosset, F.2
Standaert, F.-X.3
Pereira, O.4
-
10
-
-
84884133172
-
Stealthy compromise of wireless sensor nodes with power analysis attacks
-
Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. Springer, Heidelberg
-
de Meulenaer, G., Standaert, F.-X.: Stealthy compromise of wireless sensor nodes with power analysis attacks. In: Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. LNICST, vol. 45, pp. 229-242. Springer, Heidelberg (2010)
-
(2010)
LNICST
, vol.45
, pp. 229-242
-
-
De Meulenaer, G.1
Standaert, F.-X.2
-
11
-
-
27344450097
-
Energy-efficient software implementation of long integer modular arithmetic
-
Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
-
Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-efficient software implementation of long integer modular arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 75-90. Springer, Heidelberg (2005) (Pubitemid 41521999)
-
(2005)
Lecture Notes in Computer Science
, vol.3659
, pp. 75-90
-
-
Grossschadl, J.1
Avanzi, R.M.2
Savas, E.3
Tillich, S.4
-
12
-
-
84885002111
-
Smart elliptic curve cryptography for smart dust
-
Zhang, X., Qiao, D. (eds.) QShine 2010. Springer, Heidelberg
-
Großschädl, J., Hudler, M., Koschuch, M., Krüger, M., Szekely, A.: Smart elliptic curve cryptography for smart dust. In: Zhang, X., Qiao, D. (eds.) QShine 2010. LNICST, vol. 74, pp. 623-634. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.74
, pp. 623-634
-
-
Großschädl, J.1
Hudler, M.2
Koschuch, M.3
Krüger, M.4
Szekely, A.5
-
13
-
-
33750709739
-
m)
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 133-147
-
-
Großschädl, J.1
Savaş, E.2
-
14
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit cPUs
-
Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
-
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit cPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
16
-
-
58349103020
-
Twisted Edwards curves revisited
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326-343. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 326-343
-
-
Hisil, H.1
Wong, K.K.-H.2
Carter, G.3
Dawson, E.4
-
17
-
-
84884827958
-
NaCl on 8-bit AVR microcontrollers
-
Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. Springer, Heidelberg
-
Hutter, M., Schwabe, P.: NaCl on 8-bit AVR microcontrollers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 156-172. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7918
, pp. 156-172
-
-
Hutter, M.1
Schwabe, P.2
-
18
-
-
80053471866
-
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
-
Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
-
Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 459-474. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6917
, pp. 459-474
-
-
Hutter, M.1
Wenger, E.2
-
19
-
-
84939573910
-
Differential power analysis
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
20
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. Springer, Heidelberg
-
Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5746
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschädl, J.4
Szekely, A.5
Tillich, S.6
-
21
-
-
84868641501
-
Improved multi-precision squaring for low-end RISC microcontrollers
-
Lee, Y., Kim, I.-H., Park, Y.: Improved multi-precision squaring for low-end RISC microcontrollers. Journal of Systems and Software 86(1), 60-71 (2013)
-
(2013)
Journal of Systems and Software
, vol.86
, Issue.1
, pp. 60-71
-
-
Lee, Y.1
Kim, I.-H.2
Park, Y.3
-
25
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48(177), 243-264 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
26
-
-
0013145165
-
-
White paper July
-
National Institute of Standards and Technology (NIST). Recommended Elliptic Curves for Federal Government Use. White paper (July 1999), http://csrc.nist.gov/encryption/dss/ecdsa/NISTReCur.pdf
-
(1999)
Recommended Elliptic Curves for Federal Government Use
-
-
-
27
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
Zhu, S., Liu, D. (eds.) ACM Press
-
Piotrowski, K., Langendörfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Zhu, S., Liu, D. (eds.) Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 169-176. ACM Press (2006)
-
(2006)
Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006)
, pp. 169-176
-
-
Piotrowski, K.1
Langendörfer, P.2
Peter, S.3
-
28
-
-
85008907444
-
Multi-precision multiplication for public-key cryptography on embedded microprocessors
-
Lee, D.H., Yung, M. (eds.) WISA 2012. Springer, Heidelberg
-
Seo, H., Kim, H.: Multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 55-67. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7690
, pp. 55-67
-
-
Seo, H.1
Kim, H.2
-
29
-
-
84893757144
-
Binary and prime field multiplication for public key cryptography on embedded microprocessors
-
Seo, H., Lee, Y., Kim, H., Park, T., Kim, H.: Binary and prime field multiplication for public key cryptography on embedded microprocessors. In: Security and Communication Networks (2013)
-
(2013)
Security and Communication Networks
-
-
Seo, H.1
Lee, Y.2
Kim, H.3
Park, T.4
Kim, H.5
-
30
-
-
2442585861
-
-
Technical Report CORR 2001-41, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada
-
Solinas, J.A.: Low-weight binary representations for pairs of integers. Technical Report CORR 2001-41, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada (2001)
-
(2001)
Low-weight Binary Representations for Pairs of Integers
-
-
Solinas, J.A.1
-
31
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Verdone, R. (ed.) EWSN 2008. Springer, Heidelberg
-
Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4913
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
32
-
-
70350617038
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
Wolf, T., Parameswaran, S. (eds.)
-
Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
-
(2007)
Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007)
, pp. 11-16
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
33
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
-
Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4307
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
34
-
-
0036505481
-
Incomplete reduction in modular arithmetic
-
Yanik, T., Savaş, E., Koç, Ç.K.: Incomplete reduction in modular arithmetic. IEE Proceedings - Computers and Digital Techniques 149(2), 46-52 (2002)
-
(2002)
IEE Proceedings - Computers and Digital Techniques
, vol.149
, Issue.2
, pp. 46-52
-
-
Yanik, T.1
Savaş, E.2
Koç, Ç.K.3
|