Embedded systems security—an overview

S Parameswaran, T Wolf - Design Automation for Embedded Systems, 2008 - Springer
Security is an important aspect of embedded system design. The characteristics of
embedded systems give rise to a number of novel vulnerabilities. A variety of different …

Implementing cryptographic pairings on smartcards

M Scott, N Costigan, W Abdulwahab - International Workshop on …, 2006 - Springer
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment
in new security applications, particularly in the context of implementations of Identity-Based …

Implementing cryptographic pairings over Barreto-Naehrig curves

AJ Devegili, M Scott, R Dahab - International Conference on Pairing …, 2007 - Springer
In this paper we describe an efficient implementation of the Tate and Ate pairings using
Barreto-Naehrig pairing-friendly curves, on both a standard PC and on a 32-bit smartcard …

Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes

Z Liu, H Seo, J Großschädl… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
In this paper, we introduce a highly optimized software implementation of standards-
compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8 …

Fast multi-precision multiplication for public-key cryptography on embedded microprocessors

M Hutter, E Wenger - … Hardware and Embedded Systems–CHES 2011 …, 2011 - Springer
Multi-precision multiplication is one of the most fundamental operations on microprocessors
to allow public-key cryptography such as RSA and Elliptic Curve Cryptography (ECC). In this …

8/16/32 shades of elliptic curve cryptography on embedded processors

E Wenger, T Unterluggauer, M Werner - Progress in Cryptology …, 2013 - Springer
The decision regarding the best suitable microprocessor for a given task is one of the most
challenging assignments a hardware designer has to face. In this paper, we make a …

Energy-efficient implementation of ECDH key exchange for wireless sensor networks

C Lederer, R Mader, M Koschuch, J Großschädl… - … Security Theory and …, 2009 - Springer
Abstract Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing
number of applications ranging from environmental surveillance over medical monitoring to …

Exploring the design space of prime field vs. binary field ECC-hardware implementations

E Wenger, M Hutter - Nordic Conference on Secure IT Systems, 2011 - Springer
In this paper, we answer the question whether binary extension field or prime-field based
processors doing multi-precision arithmetic are better in the terms of area, speed, power …

[PDF][PDF] Using elliptic curves on RFID tags

M Braun, E Hess, B Meyer - … Journal of Computer Science and Network …, 2008 - Citeseer
We present a concept for the realization of asymmetric cryptographic techniques in light-
weight cryptographic devices and describe an implementation based on elliptic curve …

Enhancing the performance of symmetric-key cryptography via instruction set extensions

S O'Melia, AJ Elbirt - IEEE transactions on very large scale …, 2009 - ieeexplore.ieee.org
In this paper, instruction set extensions for a reduced instruction set computer processor are
presented to improve the software performance of the data encryption standard (DES), the …