Pages that link to "Item:Q5311468"
From MaRDI portal
The following pages link to Cryptographic Hardware and Embedded Systems - CHES 2004 (Q5311468):
Displaying 20 items.
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling (Q658674) (← links)
- Private key agreement and secure communication for heterogeneous sensor networks (Q666197) (← links)
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (Q887435) (← links)
- WAPN: a distributed wormhole attack detection approach for wireless sensor networks (Q1045610) (← links)
- Cubic B-spline fuzzy transforms for an efficient and secure compression in wireless sensor networks (Q1671690) (← links)
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol (Q1761614) (← links)
- \textsc{Brick}: asynchronous incentive-compatible payment channels (Q2147243) (← links)
- Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks (Q2864178) (← links)
- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers (Q2946459) (← links)
- Key Predistribution Scheme Using Finite Fields and Reed Muller Codes (Q3100516) (← links)
- Implementation of McEliece Based on Quasi-dyadic Goppa Codes for Embedded Devices (Q3102789) (← links)
- SIKE Round 2 Speed Record on ARM Cortex-M4 (Q3297612) (← links)
- Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors (Q3454155) (← links)
- Public Key Authentication with Memory Tokens (Q3605389) (← links)
- Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices (Q5046480) (← links)
- (Q5163746) (← links)
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors (Q5918131) (← links)
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors (Q5919015) (← links)
- Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4 (Q6134225) (← links)
- A new authentication scheme based on chaotic maps and factoring problems (Q6194071) (← links)