Bilevel programming and applications

VV Kalashnikov, S Dempe… - Mathematical …, 2015 - Wiley Online Library
A great amount of new applied problems in the area of energy networks has recently arisen
that can be efficiently solved only as mixed‐integer bilevel programs. Among them are the …

High-speed high-security signatures

DJ Bernstein, N Duif, T Lange, P Schwabe… - Journal of cryptographic …, 2012 - Springer
This paper shows that a $390 mass-market quad-core 2.4 GHz Intel Westmere (Xeon
E5620) CPU can create 109000 signatures per second and verify 71000 signatures per …

Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

The elliptic curve digital signature algorithm (ECDSA)

D Johnson, A Menezes, S Vanstone - International journal of information …, 2001 - Springer
Abstract The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve
analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI …

Curve25519: new Diffie-Hellman speed records

DJ Bernstein - Public Key Cryptography-PKC 2006: 9th International …, 2006 - Springer
This paper explains the design and implementation of a high-security elliptic-curve-Diffie-
Hellman function achieving record-setting speeds: eg, 832457 Pentium III cycles (with …

The security of vehicular ad hoc networks

M Raya, JP Hubaux - Proceedings of the 3rd ACM workshop on Security …, 2005 - dl.acm.org
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In
this paper, we address the security of these networks. We provide a detailed threat analysis …

Efficient and robust pseudonymous authentication in VANET

G Calandriello, P Papadimitratos, JP Hubaux… - Proceedings of the …, 2007 - dl.acm.org
Effective and robust operations, as well as security and privacy are critical for the
deployment of vehicular ad hoc networks (VANETs). Efficient and easy-to-manage security …

The advantages of elliptic curve cryptography for wireless security

K Lauter - IEEE Wireless communications, 2004 - ieeexplore.ieee.org
This article provides an overview of elliptic curves and their use in cryptography. The focus is
on the performance advantages to be obtained in the wireless environment by using elliptic …

A reputation-based announcement scheme for VANETs

Q Li, A Malip, KM Martin, SL Ng… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) allow vehicles to generate and broadcast messages to
inform nearby vehicles about road conditions, such as traffic congestion and accidents …

A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices

M Suárez-Albela, P Fraga-Lamas… - Sensors, 2018 - mdpi.com
The latest Internet of Things (IoT) edge-centric architectures allow for unburdening higher
layers from part of their computational and data processing requirements. In the specific …