-
1
-
-
85021070463
-
-
(Rev. 2467O-AVR-10/06) Oct
-
Atmel Corporation, ATmega128(L) Datasheet (Rev. 2467O-AVR-10/06), Oct. 2006. [Online]. Available: http://www.atmel.com/dyn/resources/prod-documents/doc2467.pdf
-
(2006)
Atmel Corporation ATmega128(L) Datasheet
-
-
-
3
-
-
33745965912
-
Curve25519: New diffie-hellman speed records
-
Berlin, Germany: Springer Verlag
-
D. J. Bernstein, "Curve25519: New Diffie-Hellman speed records, " in Public Key Cryptography. Berlin, Germany: Springer Verlag, 2006, pp. 207-228.
-
(2006)
Public Key Cryptography
, pp. 207-228
-
-
Bernstein, D.J.1
-
4
-
-
45449095464
-
Twisted edwards curves
-
Cryptology. Berlin, Germany: Springer Verlag
-
D. J. Bernstein, P. Birkner, M. Joye, T. Lange, and C. Peters, "Twisted Edwards curves, " In Progress in. Cryptology. Berlin, Germany: Springer Verlag, 2008, pp. 389-405.
-
(2008)
Progress
, pp. 389-405
-
-
Bernstein, D.J.1
Birkner, P.2
Joye, M.3
Lange, T.4
Peters, C.5
-
5
-
-
84884478474
-
High-speed high-security signatures
-
Sep
-
D. J. Bernstein, N. Duif, T. Lange, P. Schwabe and B. Y. Yang, "High-speed high-security signatures, " J. Cryptographic Eng., vol. 2, no. 2. pp. 77-89, Sep. 2012.
-
(2012)
J. Cryptographic Eng
, vol.2
, Issue.2
, pp. 77-89
-
-
Bernstein, D.J.1
Duif, N.2
Lange, T.3
Schwabe, P.4
Yang, B.Y.5
-
7
-
-
84921536005
-
-
Germany Springer Berlin Heidelberg
-
D. J. Bernstein, C. Chuengsatiansup, and T. Lange, "Curve41417: Karatsuba revisited, " In Cryptographic Hardware and Embedded Systems. Germany, Springer Berlin Heidelberg, 2014, pp. 316-334.
-
(2014)
Curve41417: Karatsuba Revisited Cryptographic Hardware and Embedded Systems
, pp. 316-334
-
-
Bernstein, D.J.1
Chuengsatiansup, C.2
Lange, T.3
-
8
-
-
84950324340
-
Selecting elliptic curves for cryptography: An efficiency and security analysis
-
J. W. Bos, C. Costello, P. Longa, and M. Naehrig, "Selecting elliptic curves for cryptography: An efficiency and security analysis, " J. Cryptographic Eng., pp. 1-28, 2015.
-
(2015)
J. Cryptographic Eng
, pp. 1-28
-
-
Bos, J.W.1
Costello, C.2
Longa, P.3
Naehrig, M.4
-
9
-
-
84919952513
-
Constant time modular inversion
-
J. W. Bos, "Constant time modular inversion, " J. Cryptographic Eng., vol. 4, no. 4, pp. 275-281, 2014.
-
(2014)
J. Cryptographic Eng
, vol.4
, Issue.4
, pp. 275-281
-
-
Bos, J.W.1
-
10
-
-
84939136474
-
Modeling energy-efficient secure communications in multimode wireless mobile devices
-
A. Castiglione, F. Palmieri, U. Fiore, A. Castiglione and A. Santis, "Modeling energy-efficient secure communications in multimode wireless mobile devices, " J. Comput. Syst. Sci., vol. 81, no. 8, pp. 1464-1478, 2014.
-
(2014)
J. Comput. Syst. Sci
, vol.81
, Issue.8
, pp. 1464-1478
-
-
Castiglione, A.1
Palmieri, F.2
Fiore, U.3
Castiglione, A.4
Santis, A.5
-
11
-
-
84890059331
-
An energy-Aware framework for reliable and secure end-To-end ubiquitous data communications
-
A. Castiglione, A. Santis, A. Castiglione, F. Palmieri and U. Fiore, "An energy-Aware framework for reliable and secure end-To-end ubiquitous data communications, " In Proc. 5th Int. Conf. Intell. Netw. Collaborative Syst., 2013, pp. 157-165.
-
(2013)
Proc. 5th Int. Conf. Intell. Netw. Collaborative Syst
, pp. 157-165
-
-
Castiglione, A.1
Santis, A.2
Castiglione, A.3
Palmieri, F.4
Fiore, U.5
-
13
-
-
84961252640
-
FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne Prime
-
Cryptology, Berlin, Germany Springer
-
C. Costello and P. Longa, "FourQ: Four-dimensional decompositions on a Q-curve over the Mersenne Prime, " In Advances. in Cryptology, Berlin, Germany: Springer, 2015, pp. 214-235.
-
(2015)
Advances
, pp. 214-235
-
-
Costello, C.1
Longa, P.2
-
14
-
-
84942983584
-
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
-
M. Dull, B. Haase, G. Hinterwäder, M. Hutter, C. Paar, A. H. Sanchez, and P Schwabe, "High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers, " Des. Codes Cryptogr, vol. 77, pp. 493-514, 2015.
-
(2015)
Des. Codes Cryptogr
, vol.77
, pp. 493-514
-
-
Dull, M.1
Haase, B.2
Hinterwäder, G.3
Hutter, M.4
Paar, C.5
Sanchez, A.H.6
Schwabe, P.7
-
15
-
-
0035015898
-
Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
-
L. M. Feeney and M. Nilsson, "Investigating the energy consumption of a wireless network interface in an ad hoc networking environment, " in Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc., 2001, vol. 3, pp. 1548-1557.
-
(2001)
Proc. 20th Annu. Joint Conf IEEE Comput. Commun. Soc
, vol.3
, pp. 1548-1557
-
-
Feeney, L.M.1
Nilsson, M.2
-
16
-
-
77649245119
-
Software implementation of pairingbased cryptography on sensor networks using the MSP430 microcontroller
-
Berlin, Germany: Springer Verlag
-
C. P. Gouvea and J. Lopez, "Software implementation of pairingbased cryptography on sensor networks using the MSP430 microcontroller, " in Progress in Cryptology. Berlin, Germany: Springer Verlag, 2009, pp. 248-262.
-
(2009)
Progress in Cryptology
, pp. 248-262
-
-
Gouvea, C.P.1
Lopez, J.2
-
17
-
-
84875622253
-
Smart elliptic curve cryptography for smart dust
-
X. Zhang and D. Qiao, editors. Berlin, Germany: Springer Verlag
-
J. Großschädl, M. Hudler, M. Koschuch, M. Kruger, and A. Szekely, "Smart elliptic curve cryptography for smart dust, " In X. Zhang and D. Qiao, editors, Quality of Service in Heterogeneous Networks. Berlin, Germany: Springer Verlag, 2010, p. 548-559.
-
(2010)
Quality of Service in Heterogeneous Networks
, pp. 548-559
-
-
Großschädl, J.1
Hudler, M.2
Koschuch, M.3
Kruger, M.4
Szekely, A.5
-
18
-
-
84942533880
-
-
Lab. Algorithmics, Cryptol. Secur., Univ. Luxembourg, Luxembourg, Tech. Rep. TR-LACS-2013-01
-
J. Großschädl, "A family of implementation-friendly MoTE elliptic curves, " Lab. Algorithmics, Cryptol. Secur., Univ. Luxembourg, Luxembourg, Tech. Rep. TR-LACS-2013-01, 2013.
-
(2013)
A Family of Implementation-friendly MoTE Elliptic Curves
-
-
Großschädl, J.1
-
19
-
-
35048818581
-
Comparing elliptic curve cryptography and RSA on 8-bit CPUs
-
N. Gura, A. Patel, A. S. Wander, H. Eberle, and S. Chang Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs, " in Proc. Cryptographic Hardware Embedded Syst., 2004, pp. 119-132.
-
(2004)
Proc. Cryptographic Hardware Embedded Syst
, pp. 119-132
-
-
Gura, N.1
Patel, A.2
Wander, A.S.3
Eberle, H.4
Chang Shantz, S.5
-
20
-
-
84978948501
-
Ed448-Goldilocks, a new elliptic curve
-
2015/ 625
-
M. Hamburg, "Ed448-Goldilocks, a new elliptic curve, " Cryptology ePrint Archive Rep. 2015/625, 2015.
-
(2015)
Cryptology EPrint Archive Rep
-
-
Hamburg, M.1
-
22
-
-
84873380326
-
Privacy preserving payments on computational RFID devices with application in intelligent transportation systems
-
Berlin, Germany: Springer Verlag
-
G. Hinterwälder, C. Paar, and W. P. Burleson, "Privacy preserving payments on computational RFID devices with application in intelligent transportation systems, " In Radio Frequency Identification Security and Privacy Issues. Berlin, Germany: Springer Verlag, 2012, pp. 109-122.
-
(2012)
Radio Frequency Identification Security and Privacy Issues
, pp. 109-122
-
-
Hinterwälder, G.1
Paar, C.2
Burleson, W.P.3
-
23
-
-
84926635301
-
Full-size high-security ECC implementation on MSP430 microcontrollers
-
Lecture Notes in Computer Science. Berlin, Germany: Springer Verlag 2015
-
G. Hinterwälder, A. Moradi, M. Hutter, P. Schwabe, and C. Paar, "Full-size high-security ECC implementation on MSP430 microcontrollers, " In Progress in Cryptology-LATINCRYPT 2014, vol. 8895 of Lecture Notes in Computer Science. Berlin, Germany: Springer Verlag, 2015, pp. 31-47.
-
(2014)
Progress in Cryptology-LATINCRYPT
, vol.8895
, pp. 31-47
-
-
Hinterwälder, G.1
Moradi, A.2
Hutter, M.3
Schwabe, P.4
Paar, C.5
-
24
-
-
58349103020
-
Twisted Edwards curves revisited
-
Berlin, Germany: Springer Verlag
-
H. Hisil, K. K.-H. Wong, G. Carter, and E. Dawson, "Twisted Edwards curves revisited, " in Adv. Cryptology. Berlin, Germany: Springer Verlag, 2008, pp. 326-343.
-
(2008)
Adv. Cryptology
, pp. 326-343
-
-
Hisil, H.1
Wong, K.K.-H.2
Carter, G.3
Dawson, E.4
-
25
-
-
0000827611
-
A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis
-
T. Itoh and S. Tsujii, "A fast algorithm for computing multiplicative inverses in GF(2m) using normal basis, " Inf. Comput., vol. 78, pp. 171-177, 1988.
-
(1988)
Inf. Comput
, vol.78
, pp. 171-177
-
-
Itoh, T.1
Tsujii, S.2
-
26
-
-
70350585044
-
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
-
Berlin, Germany: Springer Verlag
-
C. Lederer, R. Mader, M. Koschuch, J. Großschädl, A. Szekely, and S. Tillich, "Energy-efficient implementation of ECDH key exchange for wireless sensor networks, " in Information Security Theory and Practice. Berlin, Germany: Springer Verlag, 2009, pp. 112-127.
-
(2009)
Information Security Theory and Practice
, pp. 112-127
-
-
Lederer, C.1
Mader, R.2
Koschuch, M.3
Großschädl, J.4
Szekely, A.5
Tillich, S.6
-
27
-
-
85021168977
-
Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes
-
Z. Liu, J. Großschädl, L. Li, and Q. Xu, "Energy-efficient elliptic curve cryptography for MSP430-based wireless sensor nodes, " in The 21st Australasian Conf. Inform. Security Privacy, 2016, pp. 1-19.
-
(2016)
The 21st Australasian Conf. Inform. Security Privacy
, pp. 1-19
-
-
Liu, Z.1
Großschädl, J.2
Li, L.3
Xu, Q.4
-
28
-
-
51249087814
-
TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
-
A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks", in Proc. 7th Int. Conf. Inf. Process. Sensor Netw., 2008, pp. 245-256.
-
(2008)
Proc. 7th Int. Conf. Inf. Process. Sensor Netw
, pp. 245-256
-
-
Liu, A.1
Ning, P.2
-
29
-
-
84943609819
-
-
Berlin, Germany: Springer Verlag
-
Z. Liu, H. Seo, J. Großschädl, and H. Kim, "Reverse productscanning multiplication and squaring on 8-Bit AVR processors' in Information and Communications Security. Berlin, Germany: Springer Verlag, 2014, pp. 158-175.
-
(2014)
Reverse Productscanning Multiplication and Squaring on 8-Bit AVR Processors' in Information and Communications Security
, pp. 158-175
-
-
Liu, Z.1
Seo, H.2
Großschädl, J.3
Kim, H.4
-
30
-
-
84903637006
-
MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks
-
Berlin, Germany: Springer Verlag
-
Z. Liu, E. Wenger, and J. Großschädl, "MoTE-ECC: Energy-scalable elliptic curve cryptography for wireless sensor networks, " in Applied Cryptography and Network Security. Berlin, Germany: Springer Verlag, 2014, pp. 361-379.
-
(2014)
Applied Cryptography and Network Security
, pp. 361-379
-
-
Liu, Z.1
Wenger, E.2
Großschädl, J.3
-
31
-
-
84942512044
-
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks
-
Z. Liu, H. Seo, Z. Hu, X. Huang, and J. Großschädl, "Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks, " in Proc. AsiaCCS ACM, 2015, 2015, pp. 145-153.
-
(2015)
Proc. AsiaCCS ACM
, vol.2015
, pp. 145-153
-
-
Liu, Z.1
Seo, H.2
Hu, Z.3
Huang, X.4
Großschädl, J.5
-
33
-
-
80052320777
-
Shifting primes: Extension of pseudo-Mersenne primes to optimize ECC for MSP430-based future Internet of things devices
-
Berlin, Germany: Springer Verlag
-
L. Marin, A. J. Jara, and A. F. Gomez-Skarmeta, "Shifting primes: Extension of pseudo-Mersenne primes to optimize ECC for MSP430-based future Internet of things devices, " In Availability, Reliab. Secur. Business, Enterprise and Health Infor. Syst., Berlin, Germany: Springer Verlag, 2011, pp. 205-219.
-
(2011)
Availability, Reliab. Secur. Business, Enterprise and Health Infor. Syst
, pp. 205-219
-
-
Marin, L.1
Jara, A.J.2
Gomez-Skarmeta, A.F.3
-
34
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
Jan
-
P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization, " Math. Comput., vol. 48, no. 177, pp. 243-264, Jan. 1987.
-
(1987)
Math. Comput
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
35
-
-
84856097278
-
Elliptic curve cryptography on the WISP UHF RFID tag
-
Berlin, Germany: Springer Verlag
-
C. Pendl, M. Pelnar, and M. Hutter, "Elliptic curve cryptography on the WISP UHF RFID tag, " in RFID Security and Privacy. Berlin, Germany: Springer Verlag, pp. 32-47, 2012.
-
(2012)
RFID Security and Privacy
, pp. 32-47
-
-
Pendl, C.1
Pelnar, M.2
Hutter, M.3
-
36
-
-
34547420699
-
How public key cryptography influences wireless sensor node lifetime
-
S. Zhu and D. Liu, editors
-
K. Piotrowski, P. Langendörfer, and S. Peter, "How public key cryptography influences wireless sensor node lifetime, " In S. Zhu and D. Liu, editors, Proc. 4th ACM Workshop Secur. Ad Hoc Sensor Netw., 2006, pp. 169-176.
-
(2006)
Proc. 4th ACM Workshop Secur. Ad Hoc Sensor Netw
, pp. 169-176
-
-
Piotrowski, K.1
Langendörfer, P.2
Peter, S.3
-
37
-
-
84921417375
-
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
-
Jan
-
M. Rezvani, A. Ignatovic, E Bertino, and S. Jha, "Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, " IEEE Trans. Dependable Secure Comput., vol. 12, no. 1, pp. 98-110, Jan. 2015.
-
(2015)
IEEE Trans. Dependable Secure Comput
, vol.12
, Issue.1
, pp. 98-110
-
-
Rezvani, M.1
Ignatovic, A.2
Bertino, E.3
Jha, S.4
-
38
-
-
84896504545
-
Binary and prime field multiplication for public key cryptography on embedded microprocessors
-
Apr
-
H. Seo, Y. Lee, H. Kim, T. Park, and H. Kim, "Binary and prime field multiplication for public key cryptography on embedded microprocessors, " Security Commun. Netw., vol. 7, no. 4, pp. 774-787, Apr. 2014.
-
(2014)
Security Commun. Netw
, vol.7
, Issue.4
, pp. 774-787
-
-
Seo, H.1
Lee, Y.2
Kim, H.3
Park, T.4
Kim, H.5
-
39
-
-
84873810158
-
Performance enhancement of TinyECC based on multiplication optimizations
-
Feb
-
H. Seo, K.-A. Shim, and H. Kim, "Performance enhancement of TinyECC based on multiplication optimizations, " Secur. Commun. Netw., vol. 6, no. 2, pp. 151-160, Feb. 2013.
-
(2013)
Secur. Commun. Netw
, vol.6
, Issue.2
, pp. 151-160
-
-
Seo, H.1
Shim, K.-A.2
Kim, H.3
-
40
-
-
49949100301
-
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
-
Berlin, Germany: Springer Verlag
-
P. Szczechowiak, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the limits of elliptic curve cryptography in sensor networks, " in Wireless Sensor Networks. Berlin, Germany: Springer Verlag, 2008, pp. 305-320.
-
(2008)
Wireless Sensor Networks
, pp. 305-320
-
-
Szczechowiak, P.1
Oliveira, L.B.2
Scott, M.3
Collier, M.4
Dahab, R.5
-
42
-
-
70350617038
-
Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks
-
T. Wolf and S. Parameswaran, editors
-
O. Ugus, D. Westhoff, R. Laue, A. Shoufan, and S. A. Huss, "Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks, " in T. Wolf and S. Parameswaran, editors, Proc. 2nd Workshop Embedded Syst. Secur., pp. 11-16, 2007. [Online]. Available: http://arxiv. org/abs/0903.3900.
-
(2007)
Proc. 2nd Workshop Embedded Syst. Secur
, pp. 11-16
-
-
Ugus, O.1
Westhoff, D.2
Laue, R.3
Shoufan, A.4
Huss, S.A.5
-
43
-
-
85008955601
-
Efficient implementation of public key cryptosystems on mote sensors
-
P. Ning, S. Qing, and N. Li, editors. Berlin, Germany: Springer Verlag
-
H. Wang and Q. Li, "Efficient implementation of public key cryptosystems on mote sensors, " in P. Ning, S. Qing, and N. Li, editors, Information and Communications Security. Berlin, Germany: Springer Verlag, 2006, pp. 519-528.
-
(2006)
Information and Communications Security
, pp. 519-528
-
-
Wang, H.1
Li, Q.2
-
44
-
-
49949083706
-
Elliptic curve cryptography-based access control in sensor networks
-
Dec
-
H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks, " Int. J. Secur. Netw., vol. 1, no. 3-4, pp. 127-137, Dec. 2006.
-
(2006)
Int. J. Secur. Netw
, vol.1
, Issue.3-4
, pp. 127-137
-
-
Wang, H.1
Sheng, B.2
Li, Q.3
-
45
-
-
84879870623
-
Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography
-
Berlin, Germany: Springer Verlag
-
E. Wenger, "Hardware architectures for MSP430-based wireless sensor nodes performing elliptic curve cryptography, " in Applied Cryptography and Network Security. Berlin, Germany: Springer Verlag, 2013, pp. 290-306.
-
(2013)
Applied Cryptography and Network Security
, pp. 290-306
-
-
Wenger, E.1
-
47
-
-
84055198650
-
Evaluating 16-bit processors for elliptic curve cryptography
-
Berlin, Germany: Springer Verlag
-
E. Wenger and M. Werner, "Evaluating 16-bit processors for elliptic curve cryptography, " in Smart Card Research and Advanced Applications. Berlin, Germany: Springer Verlag, 2011, pp. 166-181.
-
(2011)
Smart Card Research and Advanced Applications
, pp. 166-181
-
-
Wenger, E.1
Werner, M.2
-
48
-
-
0036505481
-
Incomplete reduction in modular arithmetic
-
Mar
-
T. Yank, E. Savas , and C . K. Koc, "Incomplete reduction in modular arithmetic, " in IEE Proc.-Comput. Digital Tech., vol. 149, no. 2, pp. 46-52, Mar. 2002.
-
(2002)
IEE Proc.-Comput. Digital Tech
, vol.149
, Issue.2
, pp. 46-52
-
-
Yank, T.1
Savas, E.2
Koc, C.K.3
|