-
1
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-bit cpus
-
Aug
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz. Comparing elliptic curve cryptography and RSA on 8-bit cpus. In 2004 workshop on Cryptographic Hardware and Embedded Systems, Aug. 2004.
-
(2004)
2004 workshop on Cryptographic Hardware and Embedded Systems
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.5
-
2
-
-
0040520399
-
System architecture directions for networked sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. E. Culler, and K. Pister. System architecture directions for networked sensors. Architectural Support for Programming Languages and Operating Systems, pp. 93-104, 2000, http://webs.cs.berkeley.Edu/tos/papers/tos.pdf.
-
(2000)
Architectural Support for Programming Languages and Operating Systems
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.E.5
Pister, K.6
-
3
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
ACM Press
-
R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN '04), pp. 59-64. ACM Press, 2004.
-
(2004)
Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN '04)
, pp. 59-64
-
-
Watro, R.1
Kong, D.2
Cuti, S.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
4
-
-
0021468777
-
Fast evolution of algorithms in fields of characteristic rwo
-
D. Coppersmith, "Fast evolution of algorithms in fields of characteristic rwo", IEEE Transactions on Information Theory, 30 (1984), 587-594.
-
(1984)
IEEE Transactions on Information Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
7
-
-
0000211152
-
A Theory of Factorization and Genera
-
D. Shanks. A Theory of Factorization and Genera. In Proc. Symp. Pure Math., 20:415-440, 1971.
-
(1971)
Proc. Symp. Pure Math
, vol.20
, pp. 415-440
-
-
Shanks, D.1
-
9
-
-
84941611264
-
On the analogue of the division polynomials for hyperelliptic curves
-
D. G. Cantor. On the analogue of the division polynomials for hyperelliptic curves. J. Reine Angew. Math., 447:91-145, 1994.
-
(1994)
J. Reine Angew. Math
, vol.447
, pp. 91-145
-
-
Cantor, D.G.1
-
10
-
-
34249336679
-
-
Jacobians in NTL
-
P. Gaudry. NTLJac2, Tools for genus 2 Jacobians in NTL. http://www.lix.polytechnique.frLabo/Pierrick.Gaudry/NTLJac2/.
-
NTLJac2, Tools for genus
, vol.2
-
-
Gaudry, P.1
-
11
-
-
4243082091
-
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM47(6):53-57, 2004.
-
A. Perrig, J. Stankovic, and D. Wagner. Security in wireless sensor networks. Commun. ACM47(6):53-57, 2004.
-
-
-
-
12
-
-
85030330304
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
ACM Press
-
Menezes, A., Okamoto, T., and Vanstone, S. "Reducing elliptic curve logarithms to logarithms in a finite field". Proceedings of the twenty-third annual ACM symposium on Theory of computing. Annual ACM Symposium on Theory of Computing. ACM Press, 1991: p 80-89.
-
(1991)
Proceedings of the twenty-third annual ACM symposium on Theory of computing. Annual ACM Symposium on Theory of Computing
, pp. 80-89
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
13
-
-
0345490607
-
Certificateless public key cryptography
-
Advances in Cryptology, ASIACRYPT of, Full version available at
-
S. AlRiyami and K.G. Paterson. Certificateless public key cryptography. In Advances in Cryptology - ASIACRYPT 2003, vol. 2894 of LNCS, pp. 452-473, 2003. Full version available at http://eprint.iacr.org/.
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
AlRiyami, S.1
Paterson, K.G.2
-
14
-
-
0037623983
-
-
D. Boneh and M. Franklin. Identity-Based encryption from theWeil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. This is the full version of an extended abstract of the same title presented at Crypto'01.
-
D. Boneh and M. Franklin. Identity-Based encryption from theWeil pairing. SIAM Journal of Computing, 32(3):586-615, 2003. This is the full version of an extended abstract of the same title presented at Crypto'01.
-
-
-
-
15
-
-
77950151506
-
An Identity Based Encryption Scheme Based on Quadratic Residues
-
Proceedings of the 8th IMA International Conference on Cryptography and Coding, Springer-Verlag
-
C. Cocks, An Identity Based Encryption Scheme Based on Quadratic Residues, Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pages 360-363, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2260
, pp. 360-363
-
-
Cocks, C.1
-
16
-
-
35048835319
-
Secure Identity Based Encryption Without Random Oracles, extended
-
abstract in Proceedings of CRYPTO '04, Springer-Verlag, Full paper available in the IACR eprint archives
-
D. Boneh and X. Boyen, Secure Identity Based Encryption Without Random Oracles, extended abstract in Proceedings of CRYPTO '04, LNCS 3152, Springer-Verlag, 2004. Full paper available in the IACR eprint archives, 〈http://eprint.iacr.org/2004/173/〉.
-
(2004)
LNCS
, vol.3152
-
-
Boneh, D.1
Boyen, X.2
|