Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Cooperative collision warning using dedicated short range wireless communications
Proceedings of the 3rd international workshop on Vehicular ad hoc networks
A Hardware Algorithm for Modular Multiplication/Division Based on the Extended Euclidean Algorithm
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient and robust pseudonymous authentication in VANET
Proceedings of the fourth ACM international workshop on Vehicular ad hoc networks
IITA '08 Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application - Volume 02
Scalar multiplication on elliptic curves defined over fields of small odd characteristic
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Prime field ECDSA signature processing for reconfigurable embedded systems
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs
International Journal of Information Security and Privacy
Hi-index | 0.00 |
Transport safety applications aim at avoiding vehicular accidents by using secure broadcast vehicle-to-vehicle (V2V) communications. However, any security mechanism used for authenticating broadcast V2V messages comes with overhead in terms of computation and communications. The IEEE1609.2 standard for vehicular ad hoc networks is based on the ECDSA algorithm for supporting the authentication mechanism. This paper provides an assessment of the processing overhead of ECDSA. We describe the impact of this mechanism on VANET performance. Then we focus on the impact of authentication processing on the braking distance.