-
5
-
-
0010461175
-
-
Technical Report #00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, USA, September
-
Carman DW, Kruus PS, Matt BJ. Constraints and approaches for distributed sensor network security, Technical Report #00-010, NAI Labs, Network Associates, Inc., Glenwood, MD, USA, September 2000.
-
(2000)
Constraints and approaches for distributed sensor network security
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
6
-
-
84973569241
-
-
Data sheet, Accessed on April]
-
Crossbow Technology Inc. MICAz wireless measurement system. Data sheet, available online at: http: //www.openautomation.net/uploadsproductos/micaz_datasheet.pdf, [Accessed on April 2015].
-
(2015)
MICAz wireless measurement system
-
-
-
7
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
In, Lecture Notes in Computer Science, Springer: Berlin Heidelberg, Germany
-
Gura N, Patel A, Wander AS, Eberle H, Chang Shantz S. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Cryptographic Hardware and Embedded Systems - CHES 2004, vol.3156 of Lecture Notes in Computer Science, Springer: Berlin Heidelberg, Germany, 2004; 119-132.
-
(2004)
Cryptographic Hardware and Embedded Systems - CHES 2004
, vol.3156
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.S.3
Eberle, H.4
Chang Shantz, S.5
-
8
-
-
51249087814
-
-
Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IEEE Computer Society Press, Washington, USA
-
Liu A, Ning P. Tiny ECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), IEEE Computer Society Press, Washington, USA, 2008; 245-256.
-
(2008)
Tiny ECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
9
-
-
84973534757
-
-
White paper, available online at, Accessed on April].
-
National Institute of Standards and Technology (NIST). Recommended elliptic curves for federal government use. White paper, available online at: http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf, [Accessed on April 2015].
-
(2015)
Recommended elliptic curves for federal government use
-
-
-
10
-
-
45449095464
-
Twisted Edwards curves
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Bernstein DJ, Birkner P, Joye M, Lange T, Peters C. Twisted Edwards curves. In Proceedings of Progress in Cryptology - AFRICA-CRYPT 2008, vol.5023 of Lecture Notes in Computer Science, Springer: Verlag, 2008; 389-405.
-
(2008)
Proceedings of Progress in Cryptology - AFRICA-CRYPT 2008
, vol.5023
, pp. 389-405
-
-
Bernstein, D.J.1
Birkner, P.2
Joye, M.3
Lange, T.4
Peters, C.5
-
12
-
-
77953850023
-
-
Proceedings of the 2nd International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2006), ACM Press, Lisboa, Portugal
-
Großschädl J. TinySA: A Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2006), ACM Press, Lisboa, Portugal, 2006; 288-289.
-
(2006)
TinySA: A Security Architecture for Wireless Sensor Networks
, pp. 288-289
-
-
Großschädl, J.1
-
15
-
-
0030172012
-
Analyzing and comparing Montgomery multiplication algorithms
-
June
-
Koç ÇK, Acar T, Kaliski BS. Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro June 1996; 16(3):26-33.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 26-33
-
-
Koç, C.1
Acar, T.2
Kaliski, B.S.3
-
16
-
-
0242277358
-
Architectural enhancements for Montgomery multiplication on embedded RISC processors
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Großschädl J, Kamendje GA. Architectural enhancements for Montgomery multiplication on embedded RISC processors. In Proceedings of Applied Cryptography and Network Security - ACNS 2003, vol.2846 of Lecture Notes in Computer Science, Springer: Verlag, 2003.
-
(2003)
Proceedings of Applied Cryptography and Network Security - ACNS 2003
, vol.2846
-
-
Großschädl, J.1
Kamendje, G.A.2
-
17
-
-
84902650698
-
New speed records for Montgomery modular multiplication on 8-Bit AVR microcontrollers
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Liu Z, Großschädl J. New speed records for Montgomery modular multiplication on 8-Bit AVR microcontrollers. In Proceedings of Progress in Cryptology - AFRICACRYPT 2014, vol.8469 of Lecture Notes in Computer Science, Springer: Verlag, 2014; 215-234.
-
(2014)
Proceedings of Progress in Cryptology - AFRICACRYPT 2014
, vol.8469
, pp. 215-234
-
-
Liu, Z.1
Großschädl, J.2
-
18
-
-
84893189799
-
Multi-precision Squaring for public-key cryptography on embedded microprocessors
-
In. Springer: Verlag
-
Seo H, Liu Z, Choi J, Kim H. Multi-precision Squaring for public-key cryptography on embedded microprocessors. In Proceedings of Progress in Cryptology-INDOCRYPT 2013, Lecture Notes in Computer Science. Springer: Verlag, 2013; 227-243.
-
(2013)
Proceedings of Progress in Cryptology-INDOCRYPT 2013, Lecture Notes in Computer Science
, pp. 227-243
-
-
Seo, H.1
Liu, Z.2
Choi, J.3
Kim, H.4
-
21
-
-
38149061268
-
Faster addition and doubling on elliptic curves
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Bernstein DJ, Lange T. Faster addition and doubling on elliptic curves. In Proceedings of Advances in Cryptology - ASIA-CRYPT 2007, vol.4833 of Lecture Notes in Computer Science, Springer: Verlag, 2007; 29-50.
-
(2007)
Proceedings of Advances in Cryptology - ASIA-CRYPT 2007
, vol.4833
, pp. 29-50
-
-
Bernstein, D.J.1
Lange, T.2
-
22
-
-
58349103020
-
Twisted Edwards curves revisited
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Hişil H, Wong KKH, Carter G, Dawson E. Twisted Edwards curves revisited. In Proceedings of Advances in Cryptology - ASIA-CRYPT 2008, vol.5350 of Lecture Notes in Computer Science, Springer: Verlag, 2008; 326-343.
-
(2008)
Proceedings of Advances in Cryptology - ASIA-CRYPT 2008
, vol.5350
, pp. 326-343
-
-
Hişil, H.1
Wong, K.K.H.2
Carter, G.3
Dawson, E.4
-
23
-
-
33745965912
-
Curve25519: New Diffie-Hellman speed records
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Bernstein DJ. Curve25519: New Diffie-Hellman speed records. In Proceedings of Public Key Cryptography - PKC 2006, vol.3958 of Lecture Notes in Computer Science, Springer: Verlag, 2006; 207-228.
-
(2006)
Proceedings of Public Key Cryptography - PKC 2006
, vol.3958
, pp. 207-228
-
-
Bernstein, D.J.1
-
24
-
-
84909640423
-
Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Liu Z, Großschädl J, Wong DS. Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors. In Proceedings of the 9th China International Conference on Information Security and Cryptology- INSCRYPT 2013, vol.8567 of Lecture Notes in Computer Science, Springer: Verlag, 2013; 217-235.
-
(2013)
Proceedings of the 9th China International Conference on Information Security and Cryptology- INSCRYPT 2013
, vol.8567
, pp. 217-235
-
-
Liu, Z.1
Großschädl, J.2
Wong, D.S.3
-
25
-
-
84903637006
-
MoTE-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Liu Z, Wenger E, Großschädl J. MoTE-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks. In Proceedings of the 12th International conference of Applied Cryptography and Network Security - ACNS 2014, vol.8479 of Lecture Notes in Computer Science, Springer: Verlag, 2014; 361-379.
-
(2014)
Proceedings of the 12th International conference of Applied Cryptography and Network Security - ACNS 2014
, vol.8479
, pp. 361-379
-
-
Liu, Z.1
Wenger, E.2
Großschädl, J.3
-
26
-
-
56749174919
-
On the energy cost of communication and cryptography in wireless sensor networks
-
In. IEEE Computer Society Press
-
de Meulenaer G, Gosset F, Standaert FX, Pereira O. On the energy cost of communication and cryptography in wireless sensor networks. In Proceedings of the 4th IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008). IEEE Computer Society Press, 2008; 80-585.
-
(2008)
Proceedings of the 4th IEEE Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008)
, pp. 80-585
-
-
de Meulenaer, G.1
Gosset, F.2
Standaert, F.X.3
Pereira, O.4
-
27
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
In, Lecture Notes in Computer Science, Springer: Verlag
-
Lederer C, Mader R, Koschuch M, Großschädl J, Szekely A, Tillich S. Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In Proceedings Information Security Theory and Practice -WISTP 2009, vol.5746 of Lecture Notes in Computer Science, Springer: Verlag, 2009; 112-127.
-
(2009)
Proceedings Information Security Theory and Practice -WISTP 2009
, vol.5746
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschädl, J.4
Szekely, A.5
Tillich, S.6
-
28
-
-
34547420699
-
-
In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), ACM Press, Alexandria, VA, USA
-
Piotrowski K, Langendörfer P, Peter S. How public key cryptography influences wireless sensor node lifetime. In Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), ACM Press, Alexandria, VA, USA, 2006; 169-176.
-
(2006)
How public key cryptography influences wireless sensor node lifetime
, pp. 169-176
-
-
Piotrowski, K.1
Langendörfer, P.2
Peter, S.3
|