Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
A workload characterization of elliptic curve cryptography methods in embedded environments
MEDEA '03 Proceedings of the 2003 workshop on MEmory performance: DEaling with Applications , systems and architecture
Performance Considerations for an Embedded Implementation of OMA DRM 2
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks and ISDN Systems
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Proceedings of the 2006 international conference on Wireless communications and mobile computing
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Cost-based and time-based analysis of DoS-resistance in HIP
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
Towards a library of composable models to estimate the performance of security solutions
WOSP '08 Proceedings of the 7th international workshop on Software and performance
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field
Journal of Systems Architecture: the EUROMICRO Journal
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
On performance analysis of challenge/response based authentication in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A cryptographic processor for arbitrary elliptic curves over GF(2m)
A cryptographic processor for arbitrary elliptic curves over GF(2m)
Performance of two one-time signature schemes in space/time constrained environments
ISWPC'10 Proceedings of the 5th IEEE international conference on Wireless pervasive computing
Uplink multiuser MIMO transceiver design with transmitting beamforming under power constraints
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
A correlation power analysis attack against tate pairing on FPGA
ARC'11 Proceedings of the 7th international conference on Reconfigurable computing: architectures, tools and applications
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A reconfigurable implementation of the tate pairing computation over GF(2m)*
ARC'10 Proceedings of the 6th international conference on Reconfigurable Computing: architectures, Tools and Applications
Mobile-to-grid middleware: an approach for breaching the divide between mobile and grid environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i)
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Mobile-to-Grid middleware: bridging the gap between mobile and grid environments
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
An architectural framework for analyzing tradeoffs between software security and performance
ISARCS'10 Proceedings of the First international conference on Architecting Critical Systems
Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
Reducing the computational cost of certification path validation in mobile payment
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Efficient and secure credit card payment protocol for mobile devices
International Journal of Information and Computer Security
Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster computations, lower power consumption, as well as memory and bandwidth savings. This is especially useful for mobile devices which are typically limited in terms of their CPU, power and network connectivity. However, the true impact of any public-key cryptosystem can only be evaluated in the context of a security protocol. This paper presents a first estimate of the performance improvements that can be expected in SSL (Secure Socket Layer), the dominant security protocol on the Web today, by adding ECC support.