References
- K. Finkenzeller, "RFID Handbook, 3rd ed.," West Sussex, UK: John Wiley & Sons Inc., 2010.
- D. Culler, D. Estrin, and M. Srivastava, "Overview of Sensor Networks," Computer, vol. 37, no. 8, Aug. 2004, pp. 41-49. https://doi.org/10.1109/MC.2004.93
- W. Rankl and W. Effing, "Smart Card Handbook, 3rd ed.," West Sussex, UK: John Wiley & Sons Inc., 2003.
- A. Perrig et al., "SPINS: Security Protocols for Sensor Networks," Wireless Netw., vol. 8, no. 5, Sept. 2002, pp. 521-534. https://doi.org/10.1023/A:1016598314198
- P.P. Lopez, "Lightweight Cryptography in Radio Frequency Identification (RFID) Systems," Ph.D. dissertation, Computer Science Department, Carlos III Univ. of Madrid, Spain, 2008.
- J.P. Kaps, G. Gaubatz, and B. Sunar, "Cryptography on a Speck of Dust," Computer, vol. 40, no. 2, Feb. 2007, pp. 38-44. https://doi.org/10.1109/MC.2007.52
- M. Aigner, "Seven Reasons for Application of Standardized Crypto Functionality on Low Cost Tags," EU RFID Forum, Brussels, Belgium, Mar. 13-14, 2007, pp. 70-73.
- Y.K. Lee et al., "Elliptic Curve-Based Security Processor for RFID," IEEE Trans. Comput., vol. 57, no. 11, Nov. 2008, pp. 1514-1527. https://doi.org/10.1109/TC.2008.148
- H.R. Ahmadi and A. Afzali-Kusha, "A Low-Power and Low- Energy Flexible GF(p) ECC Processor," J. Zhejiang University - Sci. C, vol. 11, no. 9, Sept. 2010, pp. 724-736. https://doi.org/10.1631/jzus.C0910660
- K. Sakiyama, "Secure Design Methodology and Implementation for Embedded Public-Key Cryptosystems," Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, 2007.
- J. Fan, L. Batina, and I. Verbauwhede, "Light-Weight Implementation Options for Curve-Based Cryptography: HECC is also Ready for RFID," Int. Conf. Internet Technol. Secured Trans., London, UK, Nov. 9-12, 2009, pp. 1-6.
- D. Hankerson, A.J. Menezes, and S. Vanstone, "Guide to Elliptic Curve Cryptography," New York, USA: Springer-Verlag New York Inc., 2004.
- H. Cohen et al., "Handbook of Elliptic and Hyperelliptic Curve Cryptography," FL, USA: Chapman and Hall/CRC, 2006.
- P. Gaudry, "Hyperelliptic Curves and the HCDLP," in Advances in Elliptic Curve Cryptography, Cambridge, UK: Cambridge University Press, 2005, pp. 133-150.
- N. Koblitz et al., "Algebraic Aspects of Cryptography," Berlin, Germany: Springer-Verlag, 1998.
- T. Wollinger, J. Pelzl, and C. Paar, "Cantor versus Harley: Optimization and Analysis of Explicit Formulae for Hyperelliptic Curve Cryptosystems," IEEE Trans. Comput., vol. 54, no. 7, July 2005, pp. 861-872. https://doi.org/10.1109/TC.2005.109
- T. Lange, "Formulae for Arithmetic on Genus 2 Hyperelliptic Curves," Appl. Algebra Eng. Commun. Comput., vol. 15, no. 5, Feb. 2005, pp. 295-328. https://doi.org/10.1007/s00200-004-0154-8
- T. Lange and P.K. Mishra, "SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2," Int. Conf. Cryptology India, Bangalore, India, Dec. 10-12, 2005, pp. 403-416.
- X. Fan and G. Gong, "Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and their Implementations," Int. Workshop Sel. Areas Cryptography, Ottawa, Canada, Aug. 16-17, 2007, pp. 155-172.
- G. Elias, A. Miri, and T.H. Yeap, "FPGA Design of HECC Coprocessors," IEEE Int. Conf. Field-Programmable Technol., Brisbane, Australia, Dec. 6-8, 2004, pp. 343-346.
- J. Fan, L. Batina, and I. Verbauwhede, "HECC Goes Embedded: An Area-Efficient Implementation of HECC," Int. Workshop Sel. Areas Cryptography, New Brunswick, Canada, Aug. 14-15, 2008, pp. 387-400.
- J. Pelzl et al., "Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves," Int. Workshop Cryptographic Hardware Embedded Syst., Cologne, Germany, Sept. 8-10, 2003, pp. 351-365.
- A. Hodjat et al., "A Hyperelliptic Curve Crypto Coprocessor for an 8051 Microcontroller," IEEE Workshop Signal Process. Syst. Des. Implementation, Athens, Greece, Nov. 2-4, 2005, pp. 93-98.
- H. Kim et al., "Hyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates," ETRI J., vol. 30, no. 3, June 2008, pp. 365-376. https://doi.org/10.4218/etrij.08.0107.0022
- K. Sakiyama et al., "Small-Footprint ALU for Public-Key Processors for Pervasive Security," Workshop RFID Security, Graz, Austria, July 12-14, 2006, pp. 93-104.
- L. Batina, K. Sakiyama, and I.M.R. Verbauwhede, "Compact Public-Key Implementations for RFID and Sensor Nodes," in Secure Integrated Circuits and System, New York, USA: Springer US, 2010, pp. 179-195.
- H.R. Ahmadi, A. Afzali-Kusha, and M. Pedram, "A Power- Optimized Low-Energy Elliptic-Curve Crypto-Processor," IEICE Electron. Exp., vol. 7, no. 23, Dec. 2010, pp. 1752-1759. https://doi.org/10.1587/elex.7.1752
- P. Rong and M. Pedram, "An Analytical Model for Predicting the Remaining Battery Capacity of Lithium-Ion Batteries," IEEE Trans. VLSI syst., vol. 14, no. 5, May 2006, pp. 441-451. https://doi.org/10.1109/TVLSI.2006.876094