Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks
暂无分享,去创建一个
[1] Martina Zitterbart,et al. A Flexible Concept to Program and Control Wireless Sensor Networks , 2004 .
[2] William M. Daley,et al. Digital Signature Standard (DSS) , 2000 .
[3] Ross J. Anderson,et al. Key infection: smart trust for smart dust , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..
[4] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[5] Hans-Joachim Hof,et al. Secure Overlay for Service Centric Wireless Sensor Networks , 2004, ESAS.
[6] Kiyomichi Araki,et al. Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.
[7] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[8] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[9] Hans-Joachim Hof,et al. Design of a Secure Distributed Service Directory for Wireless Sensornetworks , 2004, EWSN.
[10] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[11] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[12] A. Menezes. Evaluation of Security Level of Cryptography: The Elliptic Curve Discrete Logarithm Problem (ECDLP) , 2001 .
[13] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..
[14] Qiang Huang,et al. Energy/security scalable mobile cryptosystem , 2003, 14th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003..
[15] Sandeep Kumar,et al. Embedded end-to-end wireless security with ECDH key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.
[16] Dirk Westhoff,et al. Identity certified authentication for ad-hoc networks , 2003, SASN '03.
[17] Dirk Westhoff,et al. Zero Common-Knowledge Authentication for Pervasive Networks , 2003, Selected Areas in Cryptography.
[18] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[19] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[20] Charalampos Manifavas,et al. A new family of authentication protocols , 1998, OPSR.
[21] Qiang Huang,et al. Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.
[22] Neal Koblitz,et al. CM-Curves with Good Cryptographic Properties , 1991, CRYPTO.
[23] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[24] Jerome A. Solinas. An Improved Algorithm for Arithmetic on a Family of Elliptic Curves , 1997, CRYPTO.
[25] Hans-Joachim Hof,et al. S-CAN: Sicheres Overlay für Sensornetze , 2004 .
[26] Martina Zitterbart,et al. Erste Erfahrungen mit der Karlsruher Sensornetz-Plattform , 2003 .
[27] Hilarie K. Orman,et al. Fast Key Exchange with Elliptic Curve Systems , 1995, CRYPTO.
[28] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[29] Wolfgang Bauer. Implementing elliptic curve cryptography , 2002, Communications and Multimedia Security.
[30] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[31] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.