Efficient elliptic curve exponentiation
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
HW/SW co-design of a hyperelliptic curve cryptosystem using a microcode instruction set coprocessor
Integration, the VLSI Journal - Special issue: Embedded cryptographic hardware
Ultra-low-power components for an RFID Tag with physical and chemical sensors
Microsystem Technologies - Special issue: Conference Smart Sensors, Actuators and MEMS, Maspalomas, Gran Canaria, Spain, 2-4 May 2007
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
IEICE - Transactions on Information and Systems
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
IWAAL'12 Proceedings of the 4th international conference on Ambient Assisted Living and Home Care
Shifting primes on OpenRISC processors with hardware multiplier
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
International Journal of Ad Hoc and Ubiquitous Computing
Glowbal IP: An adaptive and transparent IPv6 integration in the Internet of Things
Mobile Information Systems - Advances in Network-Based Information Systems
Hi-index | 0.00 |
Security support for small and smart devices is one of themost important issues in the Future Internet of things, since technologies such as 6LoWPAN are opening the access to the real world through Internet. 6LoWPAN devices are highly constrained in terms of computational capabilities, memory, communication bandwidth, and battery power. Therefore, in order to support security, it is necessary to implement new optimized and scalable cryptographic mechanisms, which provide security, authentication, privacy and integrity to the communications. Our research is focused on the mathematical optimization of cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC) for 6LoWPAN. Specifically, the contribution presented is a set of mathematical optimizations and its implementation for ECC in the 6LoWPAN devices based on the microprocessor Texas Instrument MSP430. The optimizations presented are focused on Montgomery multiplication operation, which has been implemented with bit shifting, and the definition of special pseudo-Mersenne primes, which we have denominated "shifting primes". These optimizations allow to implement the scalar multiplication (operation used for ECC operations) reaching a time of 1, 2665 seconds, which is 42, 8% lower of the reached by the state of the art solution TinyECC (2, 217 seconds).