Embedded systems security—an overview
Security is an important aspect of embedded system design. The characteristics of
embedded systems give rise to a number of novel vulnerabilities. A variety of different …
embedded systems give rise to a number of novel vulnerabilities. A variety of different …
Implementing cryptographic pairings on smartcards
M Scott, N Costigan, W Abdulwahab - International Workshop on …, 2006 - Springer
Pairings on elliptic curves are fast coming of age as cryptographic primitives for deployment
in new security applications, particularly in the context of implementations of Identity-Based …
in new security applications, particularly in the context of implementations of Identity-Based …
Implementing cryptographic pairings over Barreto-Naehrig curves
In this paper we describe an efficient implementation of the Tate and Ate pairings using
Barreto-Naehrig pairing-friendly curves, on both a standard PC and on a 32-bit smartcard …
Barreto-Naehrig pairing-friendly curves, on both a standard PC and on a 32-bit smartcard …
Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes
In this paper, we introduce a highly optimized software implementation of standards-
compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8 …
compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8 …
Fast multi-precision multiplication for public-key cryptography on embedded microprocessors
Multi-precision multiplication is one of the most fundamental operations on microprocessors
to allow public-key cryptography such as RSA and Elliptic Curve Cryptography (ECC). In this …
to allow public-key cryptography such as RSA and Elliptic Curve Cryptography (ECC). In this …
8/16/32 shades of elliptic curve cryptography on embedded processors
The decision regarding the best suitable microprocessor for a given task is one of the most
challenging assignments a hardware designer has to face. In this paper, we make a …
challenging assignments a hardware designer has to face. In this paper, we make a …
Energy-efficient implementation of ECDH key exchange for wireless sensor networks
Abstract Wireless Sensor Networks (WSNs) are playing a vital role in an ever-growing
number of applications ranging from environmental surveillance over medical monitoring to …
number of applications ranging from environmental surveillance over medical monitoring to …
Exploring the design space of prime field vs. binary field ECC-hardware implementations
In this paper, we answer the question whether binary extension field or prime-field based
processors doing multi-precision arithmetic are better in the terms of area, speed, power …
processors doing multi-precision arithmetic are better in the terms of area, speed, power …
[PDF][PDF] Using elliptic curves on RFID tags
M Braun, E Hess, B Meyer - … Journal of Computer Science and Network …, 2008 - Citeseer
We present a concept for the realization of asymmetric cryptographic techniques in light-
weight cryptographic devices and describe an implementation based on elliptic curve …
weight cryptographic devices and describe an implementation based on elliptic curve …
Enhancing the performance of symmetric-key cryptography via instruction set extensions
S O'Melia, AJ Elbirt - IEEE transactions on very large scale …, 2009 - ieeexplore.ieee.org
In this paper, instruction set extensions for a reduced instruction set computer processor are
presented to improve the software performance of the data encryption standard (DES), the …
presented to improve the software performance of the data encryption standard (DES), the …