Author of the publication

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks.

, , , , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 305-320. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SecLEACH - On the security of clustered sensor networks., , , , , , and . Signal Process., 87 (12): 2882-2895 (2007)A custom instruction approach for hardware and software implementations of finite field arithmetic over F263 using Gaussian normal bases., , , and . FPT, page 5-12. IEEE, (2005)ACBuilder: A tool for hardware architecture security evaluation., , , , and . HOST, page 97-102. IEEE Computer Society, (2016)Blinded-key signatures: securing private keys embedded in mobile agents., and . SAC, page 82-86. ACM, (2002)Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 137-154. Springer, (2013)Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation., and . CHES, volume 1717 of Lecture Notes in Computer Science, page 316-327. Springer, (1999)High-performance Implementation of Elliptic Curve Cryptography Using Vector Instructions., , and . ACM Trans. Math. Softw., 45 (3): 25:1-25:35 (2019)TinyTate: Computing the Tate Pairing in Resource-Constrained Sensor Nodes., , , , , and . NCA, page 318-323. IEEE Computer Society, (2007)SB-RAWVec - A Semi-Blind Watermarking Method for Vector Maps., and . ICC, page 1-6. IEEE, (2009)T-DRE: a hardware trusted computing base for direct recording electronic vote machines., , , , , and . ACSAC, page 191-198. ACM, (2010)