This thesis studies techniques for the efficient implementation of public-key cryptography on resource-constrained computing devices such as wireless sensor nodes. We focus on three different families of public-key cryptosystems, namely RSA, elliptic curve schemes (e.g. ECDH), as well as a lattice-based encryption algorithm using the ring variant of the Learning With Errors problem (Ring-LWE). In the context of efficient RSA implementation, this thesis first describes the Reverse Product Scanning (RPS) technique for multi-precision multiplication and squaring on 8-bit AVR processors. Then, we analyze and compare six algorithms for software implementation of Montgomery multiplication and shed some new light on the relative performance of th...
Abstract. Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of appl...
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services su...
Abstract. This work describes a low-cost Public-Key Cryptography (PKC) based solution for security s...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
Public-Key Cryptography (PKC) is an indispensable building block of modern security protocols, and, ...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
In this paper, we introduce a highly optimized software implementation of standards-compliant ellipt...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
The software implementation of cryptographic schemes for wireless sensor networks poses a challenge ...
Abstract. One of the huge problems for security in sensor networks is the lack of resources. Typical...
The main topic of this paper is low-cost public key cryptography in wireless sensor nodes. Security ...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
www.crypto.rub.de Abstract. In this article we present the fastest known implementation of a modular...
Abstract. Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of appl...
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services su...
Abstract. This work describes a low-cost Public-Key Cryptography (PKC) based solution for security s...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
This thesis studies techniques for the efficient implementation of public-key cryptography on resour...
Public-Key Cryptography (PKC) is an indispensable building block of modern security protocols, and, ...
peer reviewedIn this paper, we present a highly-optimized implementation of standards-compliant Elli...
peer reviewedPublic-Key Cryptography (PKC) is an indispensable building block of modern security pro...
In this paper, we introduce a highly optimized software implementation of standards-compliant ellipt...
peer reviewedThe Internet is rapidly evolving from a network of personal computers and servers to a ...
The software implementation of cryptographic schemes for wireless sensor networks poses a challenge ...
Abstract. One of the huge problems for security in sensor networks is the lack of resources. Typical...
The main topic of this paper is low-cost public key cryptography in wireless sensor nodes. Security ...
The vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags ...
www.crypto.rub.de Abstract. In this article we present the fastest known implementation of a modular...
Abstract. Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing number of appl...
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services su...
Abstract. This work describes a low-cost Public-Key Cryptography (PKC) based solution for security s...