Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
ISC '02 Proceedings of the 5th International Conference on Information Security
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
A Secure Wireless Agent-based Testbed
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices
Proceedings of the 2007 ACM symposium on Applied computing
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Computer Communications
On the implementation of security policies with adaptative encryption
Computer Communications
A study of the performance of SSL on PDAs
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Using adaptative encryption for ubiquitous environments
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
International Journal of Network Management
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Robust smart-cards-based user authentication scheme with user anonymity
Security and Communication Networks
International Journal of Communication Networks and Distributed Systems
Hi-index | 0.00 |
We developed and evaluated several cryptographic systemlibraries for Palm OS® which include stream andblock ciphers, hash functions and multiple-precision integerarithmetic operations. We noted that the encryption speedof SSC2 outperforms both ARC4 (Alleged RC4) and SEAL3.0 if the plaintext is small. On the other hand, SEAL 3.0almost doubles the speed of SSC2 when the plaintext is considerablylarge. We also observed that the optimized Rijn-daelwith 8KB of lookup tables is 4 times faster than DES.In addition, our results show that implementing the cryptographicalgorithms as system libraries does not degradetheir performance significantly. Instead, they provide greatflexibility and code management to the algorithms. Furthermore,the test results presented in this paper provide a basisfor performance estimation of cryptosystems implementedon PalmPilotTM.