1 |
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
DOI
ScienceOn
|
2 |
D. Hankerson, S. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography. New York, NY: Springer, 2004.
|
3 |
M. Scott, "Implementing cryptographic pairings," in Paring-Based Cryptography (Pairing2007), Lecture Notes in Computer Science, vol. 4575, pp. 177-196, 2007
|
4 |
P. G. Comba, "Exponentiation cryptosystems on the IBM PC," IBM Systems Journal, vol. 29, no. 4, pp. 526-538, 1990.
DOI
|
5 |
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Cryptographic Hardware and Embedded Systems (CHES 2004)., Lecture Notes in Computer Science, vol. 3156, pp. 119-132, 2004.
|
6 |
M. Hutter and E. Wenger, "Fast multi-precision multiplication for public-key cryptography on embedded microprocessors," in Cryptographic Hardware and Embedded Systems (CHES 2011), Lecture Notes in Computer Science, vol. 6917, pp. 459-474, 2011.
|
7 |
H. Seo and H. Kim, "Multi-precision multiplication for public-key cryptography on embedded microprocessors," in Information Security Applications, Lecture Notes in Computer Science, vol. 7690, pp. 55-67, 2012.
|
8 |
J. L. Hill and D. E. Culler, "Mica: a wireless platform for deeply embedded networks," IEEE Micro, vol. 22, no. 6, pp. 12-24, 2002.
DOI
|
9 |
H. Seo, Y. Lee, H. Kim, T. Park, and H. Kim, "Binary and prime field multiplication for public key cryptography on embedded microprocessors," Security and Communication Networks, vol. 7, no. 4, pp. 774-787, 2014.
DOI
ScienceOn
|
10 |
Z. Liu and J. Großschädl, "New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers," in Progress in Cryptology (AFRICACRYPT 2014), Lecture Notes in Computer Science, vol. 8469, pp. 215-234, 2014.
|
11 |
H. Seo, K. A. Shim, and H. Kim, "Performance enhancement of TinyECC based on multiplication optimizations," Security and Communication Networks, vol. 6, no. 2, pp. 151-160, 2013.
DOI
ScienceOn
|