A survey of public-key cryptographic primitives in wireless sensor networks

KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers

M Düll, B Haase, G Hinterwälder, M Hutter… - Designs, Codes and …, 2015 - Springer
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-
exchange software on three different popular microcontroller architectures. We consider a …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

Efficient pairings and ECC for embedded systems

T Unterluggauer, E Wenger - … and Embedded Systems–CHES 2014: 16th …, 2014 - Springer
The research on pairing-based cryptography brought forth a wide range of protocols
interesting for future embedded applications. One significant obstacle for the widespread …

End-to-end authentication in under-water sensor networks

E Souza, HC Wong, I Cunha, Í Cunha… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
Under-Water Wireless Sensor Networks (UWSNs) are a particular class of Wireless Sensor
Networks (WSNs) in which sensors are located, as the name suggests, underwater …

8/16/32 shades of elliptic curve cryptography on embedded processors

E Wenger, T Unterluggauer, M Werner - Progress in Cryptology …, 2013 - Springer
The decision regarding the best suitable microprocessor for a given task is one of the most
challenging assignments a hardware designer has to face. In this paper, we make a …

Multiprecision multiplication on AVR revisited

M Hutter, P Schwabe - Journal of Cryptographic Engineering, 2015 - Springer
This paper presents new speed records for multiprecision multiplication on the AVR ATmega
family of 8-bit microcontrollers. For example, our software takes only 1,969 cycles for the …

Elliptic curve cryptography for wireless sensor networks using the number theoretic transform

U Gulen, S Baktir - Sensors, 2020 - mdpi.com
We implement elliptic curve cryptography on the MSP430 which is a commonly used
microcontroller in wireless sensor network nodes. We use the number theoretic transform to …

Ultra low-power implementation of ECC on the ARM Cortex-M0+

R De Clercq, L Uhsadel, A Van Herrewege… - Proceedings of the 51st …, 2014 - dl.acm.org
In this work, elliptic curve cryptography (ECC) is used to make a fast, and very low-power
software implementation of a public-key cryptography algorithm on the ARM Cortex-M0+. An …

Full-size high-security ECC implementation on MSP430 microcontrollers

G Hinterwälder, A Moradi, M Hutter, P Schwabe… - … on cryptology and …, 2014 - Springer
In the era of the Internet of Things, smart electronic devices facilitate processes in our
everyday lives. Texas Instrument's MSP430 microcontrollers target low-power applications …