Efficiency evaluation of different types of cryptography curves on low-power devices
暂无分享,去创建一个
Pavel Masek | Jiri Hosek | Radek Fujdiak | Jiri Misurec | Petr Mlynek | P. Mlynek | J. Misurec | Pavel Mašek | Jiri Hosek | R. Fujdiak
[1] Alfred Menezes,et al. Elliptic Curve Cryptography , 2005, Encyclopedia of Cryptography and Security.
[2] Daniel J. Bernstein,et al. Curve25519: New Diffie-Hellman Speed Records , 2006, Public Key Cryptography.
[3] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[4] Craig Costello,et al. A brief discussion on selecting new elliptic curves , 2015 .
[5] Jiri Misurec,et al. Design of secure communication in network with limited resources , 2013, IEEE PES ISGT Europe 2013.
[6] Horst G. Zimmer,et al. Constructing elliptic curves with given group order over large finite fields , 1994, ANTS.
[7] Hai Bin Zhang,et al. Fast Elliptic Curve Point Multiplication Algorithm Optimization , 2013 .
[8] Radek Fujdiak. Measurement of Symmetric Cipher on Low Power Devices for Power Grids , 2015 .
[9] Petr MLYNEK,et al. Two-port Network Transfer Function for Power Line Topology Modeling , 2012 .
[10] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[11] Zhe Liu,et al. Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors , 2013, Inscrypt.
[12] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[13] Steven D. Galbraith,et al. A Cryptographic Application of Weil Descent , 1999, IMACC.
[14] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[15] Radek Fujdiak,et al. Implementation of Elliptic Curve Diffie Hellman in ultra-low power microcontroller , 2015, 2015 38th International Conference on Telecommunications and Signal Processing (TSP).
[16] R. Schoof. Journal de Theorie des Nombres de Bordeaux 7 (1995), 219{254 , 2022 .