메뉴 건너뛰기




Volumn 8233 LNCS, Issue , 2013, Pages 302-317

Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes

Author keywords

[No Author keywords available]

Indexed keywords

BETTER PERFORMANCE; EFFICIENT IMPLEMENTATION; ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOGRAPHY(ECC); SCALAR MULTIPLICATION; SIDE CHANNEL ATTACK; SIMPLE POWER ANALYSIS; WIRELESS SENSOR NODE;

EID: 84893740515     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-02726-5_22     Document Type: Conference Paper
Times cited : (18)

References (34)
  • 5
    • 33745965912 scopus 로고    scopus 로고
    • Curve25519: New Diffie-Hellman speed records
    • Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
    • Bernstein, D.J.: Curve25519: New Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207-228. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3958 , pp. 207-228
    • Bernstein, D.J.1
  • 6
    • 84893782491 scopus 로고    scopus 로고
    • Source code June
    • CertiVox Corporation. CertiVox MIRACL SDK. Source code (June 2012), http://www.certivox.com
    • (2012) CertiVox MIRACL SDK
  • 8
    • 84893741731 scopus 로고    scopus 로고
    • January
    • Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet (January 2006), http://www.xbow.com/Products/Product-pdf-files/Wireless-pdf/ MICAz-Datasheet.pdf
    • (2006) MICAz Wireless Measurement System. Data Sheet
  • 10
    • 84884133172 scopus 로고    scopus 로고
    • Stealthy compromise of wireless sensor nodes with power analysis attacks
    • Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. Springer, Heidelberg
    • de Meulenaer, G., Standaert, F.-X.: Stealthy compromise of wireless sensor nodes with power analysis attacks. In: Chatzimisios, P., Verikoukis, C., Santamaría, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. LNICST, vol. 45, pp. 229-242. Springer, Heidelberg (2010)
    • (2010) LNICST , vol.45 , pp. 229-242
    • De Meulenaer, G.1    Standaert, F.-X.2
  • 11
    • 27344450097 scopus 로고    scopus 로고
    • Energy-efficient software implementation of long integer modular arithmetic
    • Cryptographic Hardware and Embedded Systems - CHES 2005: 7th International Workshop. Proceedings
    • Großschädl, J., Avanzi, R.M., Savaş, E., Tillich, S.: Energy-efficient software implementation of long integer modular arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 75-90. Springer, Heidelberg (2005) (Pubitemid 41521999)
    • (2005) Lecture Notes in Computer Science , vol.3659 , pp. 75-90
    • Grossschadl, J.1    Avanzi, R.M.2    Savas, E.3    Tillich, S.4
  • 12
    • 84885002111 scopus 로고    scopus 로고
    • Smart elliptic curve cryptography for smart dust
    • Zhang, X., Qiao, D. (eds.) QShine 2010. Springer, Heidelberg
    • Großschädl, J., Hudler, M., Koschuch, M., Krüger, M., Szekely, A.: Smart elliptic curve cryptography for smart dust. In: Zhang, X., Qiao, D. (eds.) QShine 2010. LNICST, vol. 74, pp. 623-634. Springer, Heidelberg (2012)
    • (2012) LNICST , vol.74 , pp. 623-634
    • Großschädl, J.1    Hudler, M.2    Koschuch, M.3    Krüger, M.4    Szekely, A.5
  • 13
    • 33750709739 scopus 로고    scopus 로고
    • m)
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • m). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 133-147. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 133-147
    • Großschädl, J.1    Savaş, E.2
  • 14
    • 35048818581 scopus 로고    scopus 로고
    • Comparing elliptic curve cryptography and RSA on 8-bit cPUs
    • Joye, M., Quisquater, J.-J. (eds.) CHES 2004. Springer, Heidelberg
    • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit cPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119-132. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3156 , pp. 119-132
    • Gura, N.1    Patel, A.2    Wander, A.3    Eberle, H.4    Shantz, S.C.5
  • 16
    • 58349103020 scopus 로고    scopus 로고
    • Twisted Edwards curves revisited
    • Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
    • Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326-343. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5350 , pp. 326-343
    • Hisil, H.1    Wong, K.K.-H.2    Carter, G.3    Dawson, E.4
  • 17
    • 84884827958 scopus 로고    scopus 로고
    • NaCl on 8-bit AVR microcontrollers
    • Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. Springer, Heidelberg
    • Hutter, M., Schwabe, P.: NaCl on 8-bit AVR microcontrollers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 156-172. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7918 , pp. 156-172
    • Hutter, M.1    Schwabe, P.2
  • 18
    • 80053471866 scopus 로고    scopus 로고
    • Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
    • Preneel, B., Takagi, T. (eds.) CHES 2011. Springer, Heidelberg
    • Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 459-474. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6917 , pp. 459-474
    • Hutter, M.1    Wenger, E.2
  • 19
    • 84939573910 scopus 로고    scopus 로고
    • Differential power analysis
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388-397. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 388-397
    • Kocher, P.C.1    Jaffe, J.2    Jun, B.3
  • 20
    • 70350585044 scopus 로고    scopus 로고
    • Energy-efficient implementation of ECDH key exchange for wireless sensor networks
    • Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. Springer, Heidelberg
    • Lederer, C., Mader, R., Koschuch, M., Großschädl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. LNCS, vol. 5746, pp. 112-127. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5746 , pp. 112-127
    • Lederer, C.1    Mader, R.2    Koschuch, M.3    Großschädl, J.4    Szekely, A.5    Tillich, S.6
  • 21
    • 84868641501 scopus 로고    scopus 로고
    • Improved multi-precision squaring for low-end RISC microcontrollers
    • Lee, Y., Kim, I.-H., Park, Y.: Improved multi-precision squaring for low-end RISC microcontrollers. Journal of Systems and Software 86(1), 60-71 (2013)
    • (2013) Journal of Systems and Software , vol.86 , Issue.1 , pp. 60-71
    • Lee, Y.1    Kim, I.-H.2    Park, Y.3
  • 25
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Mathematics of Computation 48(177), 243-264 (1987)
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 26
    • 0013145165 scopus 로고    scopus 로고
    • White paper July
    • National Institute of Standards and Technology (NIST). Recommended Elliptic Curves for Federal Government Use. White paper (July 1999), http://csrc.nist.gov/encryption/dss/ecdsa/NISTReCur.pdf
    • (1999) Recommended Elliptic Curves for Federal Government Use
  • 28
    • 85008907444 scopus 로고    scopus 로고
    • Multi-precision multiplication for public-key cryptography on embedded microprocessors
    • Lee, D.H., Yung, M. (eds.) WISA 2012. Springer, Heidelberg
    • Seo, H., Kim, H.: Multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 55-67. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7690 , pp. 55-67
    • Seo, H.1    Kim, H.2
  • 29
    • 84893757144 scopus 로고    scopus 로고
    • Binary and prime field multiplication for public key cryptography on embedded microprocessors
    • Seo, H., Lee, Y., Kim, H., Park, T., Kim, H.: Binary and prime field multiplication for public key cryptography on embedded microprocessors. In: Security and Communication Networks (2013)
    • (2013) Security and Communication Networks
    • Seo, H.1    Lee, Y.2    Kim, H.3    Park, T.4    Kim, H.5
  • 30
    • 2442585861 scopus 로고    scopus 로고
    • Technical Report CORR 2001-41, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada
    • Solinas, J.A.: Low-weight binary representations for pairs of integers. Technical Report CORR 2001-41, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada (2001)
    • (2001) Low-weight Binary Representations for Pairs of Integers
    • Solinas, J.A.1
  • 31
    • 49949100301 scopus 로고    scopus 로고
    • NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
    • Verdone, R. (ed.) EWSN 2008. Springer, Heidelberg
    • Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305-320. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4913 , pp. 305-320
    • Szczechowiak, P.1    Oliveira, L.B.2    Scott, M.3    Collier, M.4    Dahab, R.5
  • 32
    • 70350617038 scopus 로고    scopus 로고
    • Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
    • Wolf, T., Parameswaran, S. (eds.)
    • Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11-16 (2007), http://arxiv.org/abs/0903.3900
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007) , pp. 11-16
    • Ugus, O.1    Westhoff, D.2    Laue, R.3    Shoufan, A.4    Huss, S.A.5
  • 33
    • 85008955601 scopus 로고    scopus 로고
    • Efficient implementation of public key cryptosystems on mote sensors
    • Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. Springer, Heidelberg
    • Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519-528. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 519-528
    • Wang, H.1    Li, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.