A survey of public-key cryptographic primitives in wireless sensor networks
KA Shim - IEEE Communications Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Cryptographic primitives are fundamental building blocks for designing security protocols to
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
achieve confidentiality, authentication, integrity and non-repudiation. It is not too much to say …
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
This paper presents new speed records for 128-bit secure elliptic-curve Diffie–Hellman key-
exchange software on three different popular microcontroller architectures. We consider a …
exchange software on three different popular microcontroller architectures. We consider a …
Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …
internet of things and industry 4.0. These autonomous resource-constrained devices share …
Efficient pairings and ECC for embedded systems
T Unterluggauer, E Wenger - … and Embedded Systems–CHES 2014: 16th …, 2014 - Springer
The research on pairing-based cryptography brought forth a wide range of protocols
interesting for future embedded applications. One significant obstacle for the widespread …
interesting for future embedded applications. One significant obstacle for the widespread …
End-to-end authentication in under-water sensor networks
Under-Water Wireless Sensor Networks (UWSNs) are a particular class of Wireless Sensor
Networks (WSNs) in which sensors are located, as the name suggests, underwater …
Networks (WSNs) in which sensors are located, as the name suggests, underwater …
8/16/32 shades of elliptic curve cryptography on embedded processors
The decision regarding the best suitable microprocessor for a given task is one of the most
challenging assignments a hardware designer has to face. In this paper, we make a …
challenging assignments a hardware designer has to face. In this paper, we make a …
Multiprecision multiplication on AVR revisited
This paper presents new speed records for multiprecision multiplication on the AVR ATmega
family of 8-bit microcontrollers. For example, our software takes only 1,969 cycles for the …
family of 8-bit microcontrollers. For example, our software takes only 1,969 cycles for the …
Elliptic curve cryptography for wireless sensor networks using the number theoretic transform
U Gulen, S Baktir - Sensors, 2020 - mdpi.com
We implement elliptic curve cryptography on the MSP430 which is a commonly used
microcontroller in wireless sensor network nodes. We use the number theoretic transform to …
microcontroller in wireless sensor network nodes. We use the number theoretic transform to …
Ultra low-power implementation of ECC on the ARM Cortex-M0+
In this work, elliptic curve cryptography (ECC) is used to make a fast, and very low-power
software implementation of a public-key cryptography algorithm on the ARM Cortex-M0+. An …
software implementation of a public-key cryptography algorithm on the ARM Cortex-M0+. An …
Full-size high-security ECC implementation on MSP430 microcontrollers
In the era of the Internet of Things, smart electronic devices facilitate processes in our
everyday lives. Texas Instrument's MSP430 microcontrollers target low-power applications …
everyday lives. Texas Instrument's MSP430 microcontrollers target low-power applications …