EFFICIENCY AND EFFECTIVENESS ANALYSIS OVER ECC-BASED DIRECT AND INDIRECT AUTHENTICATION PROTOCOLS: AN EXTENSIVE COMPARATIVE STUDY
暂无分享,去创建一个
[1] Rehan Akbani,et al. Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).
[2] M. Indra Devi,et al. Knapsack Based ECC Encryption and Decryption , 2009, Int. J. Netw. Secur..
[3] Natarajan Vijayarangan. A system and design of extensible authentication protocols based on ECC and SKE mechanisms for mobile and wireless communications , 2010 .
[4] Eman Shaaban,et al. Lightweight Mutual Authentication Protocol for Low Cost RFID Tags , 2010, ArXiv.
[5] Lei Yang,et al. Identification-free batch authentication for RFID tags , 2010, The 18th IEEE International Conference on Network Protocols.
[6] Manju Sanghi,et al. Speeding up Computation of Scalar Multiplication in , 2010 .
[7] Zoltán Ádám Mann,et al. IMPLEMENTING ELLIPTIC CURVE CRYPTOGRAPHY ON PC AND SMART CARD , 2003 .
[8] Wenbo Mao,et al. An Identity-based Non-interactive Authentication Framework for Computational Grids , 2004 .
[9] K. Thilagavathi,et al. An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks , 2009 .
[10] Wayne Luk,et al. Reconfigurable elliptic curve cryptosystems on a chip , 2005, Design, Automation and Test in Europe.
[11] Berk Sunar,et al. Low-Power Elliptic Curve Cryptography Using Scaled Modular Arithmetic , 2004, CHES.
[12] Miguel Morales-Sandoval,et al. On the hardware design of an elliptic curve cryptosystem , 2004, Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004..
[13] Peter Langendörfer,et al. Adaptable Security in Wireless Sensor Networks by Using Reconfigurable ECC Hardware Coprocessors , 2010, Int. J. Distributed Sens. Networks.
[14] Kefa Rabah,et al. Elliptic Curve Cryptography over Binary Finite Field GF(2m) , 2006 .
[15] V. Sumathy,et al. A Novel Approach Towards Cost Effective Region-Based Group Key Agreement Protocol for Peer - to - Peer Information Sharing in Mobile Ad Hoc Networks , 2010, ArXiv.
[16] Wayne Luk,et al. Customizable elliptic curve cryptosystems , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[17] Wendy Chou,et al. Elliptic Curve Cryptography and Its Applications to Mobile Devices , 2022 .
[18] Paz Morillo,et al. An efficient semantically secure elliptic curve cryptosystem based on KMOV , 2002, IACR Cryptol. ePrint Arch..
[19] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[20] K. Thilagavathi,et al. A NOVEL PROTOCOL FOR INDIRECT AUTHENTICATION IN MOBILE NETWORKS BASED ON ELLIPTIC CURVE CRYPTOGRAPHY , 2009 .
[21] Adnan Abdul-Aziz Gutub,et al. Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture using Parallel Jacobian Coordinate System , 2010 .
[22] Kefa Rabah. Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes , 2005 .
[23] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[24] Kwangjo Kim,et al. Untraceable Mobile Node Authentication in WSN , 2010, Sensors.
[25] Tarek A. El-Ghazawi,et al. Implementation of Elliptic Curve Cryptosystems on a reconfigurable computer , 2003, Proceedings. 2003 IEEE International Conference on Field-Programmable Technology (FPT) (IEEE Cat. No.03EX798).
[26] Liu Zhi-meng. An elliptic curve cryptography based on authentication and key agreement protocol for wireless communication , 2008 .
[27] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[28] S. Prasanna Ganesan. An Efficient Protocol for Resource Constrained Platforms Using ECC , 2009 .
[29] K. Thanushkodi,et al. Performance analysis of mobile IP registration protocols , 2009 .
[30] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[31] Salwa H. El-Ramly,et al. New real time multicast authentication protocol , 2008, 2008 International Conference on Computer Engineering & Systems.
[32] Joos Vandewalle,et al. Hardware architectures for public key cryptography , 2003, Integr..
[33] Vipul Gupta,et al. An End-to-End Systems Approach to Elliptic Curve Cryptography , 2002, CHES.