The software implementation of cryptographic schemes for wireless sensor networks poses a challenge due to the limited capabilites of the platform. Nevertheless, its feasibility has been shown in recent papers. In this work we describe a software implementation of pairing-based cryptography and elliptic curve cryptography for the MSP430 microcontroller, which is used in some wireless sensors including the Tmote Sky and TelosB. We have implemented the pairing computation for the MNT and BN curves over prime fields along with the ECDSA scheme. The main result of this work is a platform-specific optimization for the multiplication and reduction routines that leads to a 28% speedup in the field multiplication compared to the best known timings ...
Many cryptographic applications use bilinear pairing such as identity based signature, instance iden...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation i...
Public-Key Cryptography (PKC) is an indispensable building block of modern security protocols, and, ...
Redes de sensores sem fio têm se tornado populares recentemente e possuem inúmeras aplicações. Contu...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
In this paper, we introduce a highly optimized software implementation of standards-compliant ellipt...
peer reviewedWireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, w...
The framework of low-cost interconnected devices forms a new kind of cryptographic environment with...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
Many cryptographic applications use bilinear pairing such as identity based signature, instance iden...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation i...
Public-Key Cryptography (PKC) is an indispensable building block of modern security protocols, and, ...
Redes de sensores sem fio têm se tornado populares recentemente e possuem inúmeras aplicações. Contu...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
In this paper, we introduce a highly optimized software implementation of standards-compliant ellipt...
peer reviewedWireless Sensor Networks (WSNs) are susceptible to a wide range of malicious attacks, w...
The framework of low-cost interconnected devices forms a new kind of cryptographic environment with...
This paper presents new software speed records for the computation of cryptographic pairings. More s...
Many cryptographic applications use bilinear pairing such as identity based signature, instance iden...
Abstract—Computing Bilinear Pairing on sensor platforms has become an important research topic since...
Wireless Sensor Networks (WSNs) pose a number of unique security challenges that demand innovation i...