-
2
-
-
77953885098
-
A milestone towards RFID products offering asymmetric authentication based on elliptic curve cryptography
-
July
-
H. Bock, M. Braun, M. Dichtl, J. Heyszl, E. Hess, W. Kargl, H. Koroschetz, B. Meyer, and H. Seuschek, "A Milestone Towards RFID Products Offering Asymmetric Authentication Based on Elliptic Curve Cryptography," in Workshop on RFID Security and Privacy (RFIDSec), July 2008.
-
(2008)
Workshop on RFID Security and Privacy (RFIDSec)
-
-
Bock, H.1
Braun, M.2
Dichtl, M.3
Heyszl, J.4
Hess, E.5
Kargl, W.6
Koroschetz, H.7
Meyer, B.8
Seuschek, H.9
-
3
-
-
84890112675
-
Emulation-based fault effect analysis for resource constrained, secure, and dependable systems
-
September
-
N. Druml, M. Menghin, D. Kroisleitner, C. Steger, R. Weiss, A. Krieg, H. Bock, and J. Haid, "Emulation-Based Fault Effect Analysis for Resource Constrained, Secure, and Dependable Systems," in Euromicro Conference on Digital System Design (DSD), September 2013, pp. 337-344.
-
(2013)
Euromicro Conference on Digital System Design (DSD)
, pp. 337-344
-
-
Druml, N.1
Menghin, M.2
Kroisleitner, D.3
Steger, C.4
Weiss, R.5
Krieg, A.6
Bock, H.7
Haid, J.8
-
4
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
March
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks," in Third IEEE International Conference on Pervasive Computing and Communications (PerCom), March 2005, pp. 324-328.
-
(2005)
Third IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 324-328
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.5
-
5
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
March
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls, and I. Verbauwhede, "Public-Key Cryptography for RFID-Tags," in Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops, March 2007, pp. 217-222.
-
(2007)
Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
6
-
-
58049152104
-
ERAP: ECC based RFID authentication protocol
-
October
-
S. Ahamed, F. Rahman, and E. Hoque, "ERAP: ECC Based RFID Authentication Protocol," in 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS), October 2008, pp. 219-225.
-
(2008)
12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS)
, pp. 219-225
-
-
Ahamed, S.1
Rahman, F.2
Hoque, E.3
-
7
-
-
77957684720
-
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations
-
June
-
G. Godor, N. Giczi, and S. Imre, "Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations," in Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, June 2010, pp. 650-657.
-
(2010)
Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on
, pp. 650-657
-
-
Godor, G.1
Giczi, N.2
Imre, S.3
-
8
-
-
70449491200
-
Using elliptic curves on RFID tags
-
February
-
B. Michael, H. Erwin, and M. Bernd, "Using Elliptic Curves on RFID Tags," International Journal of Computer Science and Network Security, vol. 8, no. 2, pp. 1-9, February 2008.
-
(2008)
International Journal of Computer Science and Network Security
, vol.8
, Issue.2
, pp. 1-9
-
-
Michael, B.1
Erwin, H.2
Bernd, M.3
-
10
-
-
84893159860
-
8/16/32 shades of elliptic curve cryptography on embedded processors
-
Springer International Publishing
-
E. Wenger, T. Unterluggauer, and M. Werner, "8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors," in Progress in Cryptology INDOCRYPT 2013, ser. Lecture Notes in Computer Science. Springer International Publishing, 2013, vol. 8250, pp. 244-261.
-
(2013)
Progress in Cryptology INDOCRYPT 2013, Ser. Lecture Notes in Computer Science
, vol.8250
, pp. 244-261
-
-
Wenger, E.1
Unterluggauer, T.2
Werner, M.3
-
12
-
-
84903203232
-
Hardware/software co-design of elliptic-curve cryptography for resource-constrained applications
-
June
-
Höller, A. and Druml, N. and Kreiner, C. and Steger, C. and Felicijan, T., "Hardware/Software Co-Design of Elliptic-Curve Cryptography for Resource-Constrained Applications," in 51th ACM / EDAC / IEEE Design Automation Conference (DAC), June 2014.
-
(2014)
51th ACM / EDAC / IEEE Design Automation Conference (DAC)
-
-
Höller, A.1
Druml, N.2
Kreiner, C.3
Steger, C.4
Felicijan, T.5
-
13
-
-
33749019592
-
A low-cost ecc coprocessor for smartcards
-
Springer Berlin Heidelberg
-
H. Aigner, H. Bock, M. Hütter, and J. Wolkerstorfer, "A Low-Cost ECC Coprocessor for Smartcards," in Cryptographic Hardware and Embedded Systems (CHES), ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2004, vol. 3156, pp. 107-118.
-
(2004)
Cryptographic Hardware and Embedded Systems (CHES), Ser. Lecture Notes in Computer Science
, vol.3156
, pp. 107-118
-
-
Aigner, H.1
Bock, H.2
Hütter, M.3
Wolkerstorfer, J.4
-
14
-
-
70350639755
-
ECC is ready for RFID a proof in silicon
-
Springer Berlin Heidelberg
-
D. Hein, J. Wolkerstorfer, and N. Felber, "ECC Is Ready for RFID A Proof in Silicon," in Selected Areas in Cryptography, ser. Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009, vol. 5381, pp. 401-413.
-
(2009)
Selected Areas in Cryptography, Ser. Lecture Notes in Computer Science
, vol.5381
, pp. 401-413
-
-
Hein, D.1
Wolkerstorfer, J.2
Felber, N.3
-
15
-
-
84884901656
-
Security-enabled near-field communication tag with flexible architecture supporting asymmetric cryptography
-
November
-
T. Plos, M. Hutter, M. Feldhofer, M. Stiglic, and F. Cavaliere, "Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 21, no. 11, pp. 1965-1974, November 2013.
-
(2013)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.21
, Issue.11
, pp. 1965-1974
-
-
Plos, T.1
Hutter, M.2
Feldhofer, M.3
Stiglic, M.4
Cavaliere, F.5
-
16
-
-
84890858292
-
A secure zero-energy NFC solution for everyday electronic devices
-
November
-
N. Druml, M. Menghin, C. Steger, H. Bock, and J. Haid, "A secure zero-energy NFC solution for everyday electronic devices," e & i Elektrotechnik und Informationstechnik, vol. 130, no. 7, pp. 224-229, November 2013.
-
(2013)
E & i Elektrotechnik und Informationstechnik
, vol.130
, Issue.7
, pp. 224-229
-
-
Druml, N.1
Menghin, M.2
Steger, C.3
Bock, H.4
Haid, J.5
-
18
-
-
33749514826
-
Efficient software-implementation of finite fields with applications to cryptography
-
J. Guajardo, S. Kumar, C. Paar, and J. Pelzl, "Efficient Software-Implementation of Finite Fields with Applications to Cryptography," Acta Applicandae Mathematica, vol. 93, no. 1-3, pp. 3-32, 2006.
-
(2006)
Acta Applicandae Mathematica
, vol.93
, Issue.1-3
, pp. 3-32
-
-
Guajardo, J.1
Kumar, S.2
Paar, C.3
Pelzl, J.4
|