Cryptographic Hardware and Embedded Systems - CHES 2004
From MaRDI portal
Publication:5311468
Recommendations
- scientific article; zbMATH DE number 1186878
- 8/16/32 shades of elliptic curve cryptography on embedded processors
- An End-to-End Systems Approach to Elliptic Curve Cryptography
- Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes
- scientific article; zbMATH DE number 1998748
Cited in
(29)- Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4
- HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
- A fast and secure RSA public key cryptosystem
- High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
- On the strength comparison of the ECDLP and the IFP
- Topics in Cryptology – CT-RSA 2004
- Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes
- scientific article; zbMATH DE number 1998748 (Why is no real title available?)
- 8/16/32 shades of elliptic curve cryptography on embedded processors
- SIKE round 2 speed record on ARM Cortex-M4
- Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol
- High-performance ideal lattice-based cryptography on 8-bit ATxmega microcontrollers
- Implementation of McEliece based on quasi-dyadic Goppa codes for embedded devices
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
- \textsc{Brick}: asynchronous incentive-compatible payment channels
- A lightweight ATmega-based application-specific instruction-set processor for elliptic curve cryptography
- A new authentication scheme based on chaotic maps and factoring problems
- Mote-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks
- WAPN: a distributed wormhole attack detection approach for wireless sensor networks
- Elliptic curve with Optimal mixed Montgomery-Edwards model for low-end devices
- Low-weight primes for lightweight elliptic curve cryptography on 8-bit AVR processors
- New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers
- Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
- Cubic B-spline fuzzy transforms for an efficient and secure compression in wireless sensor networks
- Private key agreement and secure communication for heterogeneous sensor networks
- Design, analysis and performance evaluation of group key establishment in wireless sensor networks
- Key predistribution scheme using finite fields and Reed Muller codes
- Public Key Authentication with Memory Tokens
This page was built for publication: Cryptographic Hardware and Embedded Systems - CHES 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5311468)