Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
The sybil attack in sensor networks: analysis & defenses
Proceedings of the 3rd international symposium on Information processing in sensor networks
The platforms enabling wireless sensor networks
Communications of the ACM - Wireless sensor networks
Interesting Applications of Atmel AVR Microcontrollers
DSD '04 Proceedings of the Digital System Design, EUROMICRO Systems
Telos: enabling ultra-low power wireless research
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
A survey on wireless multimedia sensor networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A survey of key management schemes in wireless sensor networks
Computer Communications
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
ACM Transactions on Sensor Networks (TOSN)
A low-complexity LUT-based squaring algorithm
Computers & Mathematics with Applications
Enabling full-size public-key algorithms on 8-bit sensor nodes
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
NanoECC: testing the limits of elliptic curve cryptography in sensor networks
EWSN'08 Proceedings of the 5th European conference on Wireless sensor networks
The intrusion detection in mobile sensor network
Proceedings of the eleventh ACM international symposium on Mobile ad hoc networking and computing
How Key Establishment in Medical Sensor Networks Benefits from Near Field Communication Technology
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
CHES'11 Proceedings of the 13th international conference on Cryptographic hardware and embedded systems
Efficient implementation of public key cryptosystems on mote sensors (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Securing wireless sensor networks: a survey
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
We present an enhanced multi-precision squaring algorithm for low-end RISC microcontrollers. Generally, they have many general-purpose registers and limited bus size (8-32bits). The proposed scheme employs a new technique, ''lazy doubling'' with optimizing computing sequences; so, it is significantly faster than the previous algorithms. Mathematical analysis shows that the number of clocks required by the proposed algorithm is about 67% of those required by the carry-catcher squaring algorithm. To the best of our knowledge this is known to be the fastest squaring algorithm. Experimental results on the ATmega128 microprocessor show that our algorithm is about 1.5 times faster than the carry-catcher squaring algorithm in terms of the number of clocks required. As squaring is a key operation in public key cryptography, the proposed algorithm can contribute to lowering power consumption in secure WSNs (wireless sensor networks) or secure embedded systems.