Efficient elliptic curve exponentiation
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
From Euclid's GCD to Montgomery Multiplication to the Great Divide
From Euclid's GCD to Montgomery Multiplication to the Great Divide
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper)
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
Distributed user access control in sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs
Information Security Applications
IBE-lite: a lightweight identity-based cryptography for body sensor networks
IEEE Transactions on Information Technology in Biomedicine - Special section on body sensor networks
Security considerations for the wireless HART protocol
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
CAT: building couples to early detect node compromise attack in wireless sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A strong user authentication scheme with smart cards for wireless communications
Computer Communications
A review on body area networks security for healthcare
ISRN Communications and Networking
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
A sinkhole resilient protocol for wireless sensor networks: Performance and security analysis
Computer Communications
Practical RSA signature scheme based on periodical rekeying for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Secure and efficient dynamic program update in wireless sensor networks
Security and Communication Networks
Performance analysis of deterministic key allocation schemes for wireless sensor networks
International Journal of Wireless and Mobile Computing
Improved multi-precision squaring for low-end RISC microcontrollers
Journal of Systems and Software
An 8-bit AVR-Based Elliptic Curve Cryptographic RISC Processor for the Internet of Things
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
Securing ZigBee smart energy profile 1.x with OpenECC library
Proceedings of the first ACM workshop on Smart energy grid security
Publicly verifiable ciphertexts
Journal of Computer Security - Advances in Security for Communication Networks
Hi-index | 0.00 |
We report our implementation of the RSA and ECC public-key cryptosystem on Berkeley Motes. We detail the implementation of 1024-bit RSA and 160-bit ECC cryptosystems on MICA mote sensors. We have achieved the performance of 0.79s for RSA public key operation and 21.5s for private operation, and 1.3s for ECC signature generation and 2.8s for verification. For comparison, we also show our new ECC implementation on TelosB motes with a signature time 1.60s and a verification time 3.30s. For the detailed description of the implementation, we refer to our technical report [13].