Cryptography Reference
In-Depth Information
Conference on Information and Communications Security: Lecture Notes in Computer Science.
Springer-Verlag, 1997, 282-290.
Montgomery, P. Modular multiplication without division. Mathematics of Computation
(American Mathematical Society) 44 (1985): 519-521.
NIST. Recommended elliptic curves for Federal government use. National Institute of Standards
and Technology, 1999. http://csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.doc
Paar, C. Implementation options for finite field arithmetic for elliptic curve cryptosystems.
Invited presentation at the 3rd Workshop on Elliptic Curve Cryptography (ECC'99). 1999.
Pohlig, S., and M. Hellman. An improved algorithm for computing logarithms over GF(p)
and its cryptographic significance. Edited by IEEE. Transactions on Information Theory 24
(1978): 106-110.
Pollard, J. M. Monte Carlo methods for index computation (mod p). Mathematics of Computation
(American Mathematical Society) 32 (1978): 918-924.
Seo, S. C., D. Han, and S. Hong. TinyECCK: Efficient elliptic curve cryptography implementa-
tion over G(2) on 8-bit MICAz mote. IEICE Transactions. IEICE, 2008.
Shantz, S. C. From Euclid's GCD to Montegomery multiplication to the great divide. TR-2001-95
2001, Sun Microsystems Laboratories, 2001.
Szczechowiak, P. Cryptographic key distribution in wireless sensor networks using bilinear pair-
ings. Ph.D. thesis, Dublin City University, 2010.
Szczechowiak, P, L. B. Oliveira, M. Scott, M. Collier, and R. Dahab. NanoECC: Testing the
limits of elliptic curve cryptography in sensor networks. European Conference on Wireless
Sensor Networks, Lecture Notes in Computer Science . Springer, 2008, 305-320.
Uhsadel, L., A. Poschmann, and C. Paar. Enabling full-size public-key algorithms on 8-bit sen-
sor nodes. European Workshop on Security and Privacy in Ad Hoc and Sensor Networks: Lecture
Notes in Computer Science. Springer, 2007, 73-86.
Wang, H., B. Sheng, and Q. Li. Elliptic curve cryptography based access control in sensor net-
works. International Journal of Security and Networks 1 (2006): 127-137.
Woodbury, A. D., D. V. Bailey, and C. Paar. Elliptic curve cryptography on smart cards without
coprocessors. The Fourth Smart Card Research and Advanced Applications. 2000.
Yan, H., and Z. J. Shi. Studying software implementations of elliptic curve cryptography. 3rd
International Conference on Information Technology: New Generations. IEEE, 2006, 78-83.
Search WWH ::




Custom Search