Back to Results
First PageMeta Content
Elliptic curves / Twisted Edwards curve / Elliptic curve / Montgomery curve / Edwards curve / Hyperelliptic curve cryptography / Curve / Elliptic Curve DSA / Table of costs of operations in elliptic curves / Cryptography / Elliptic curve cryptography / Abstract algebra


Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes Dalin Chu Johann Großschädl
Add to Reading List

Document Date: 2013-03-25 20:03:52


Open Document

File Size: 237,49 KB

Share Result on Facebook

City

Heverlee / /

Company

Atmel / Wireless Sensor Networks / NAI Labs / Bernstein / 3M / ACM Press / Cryptographic Hardware / Crossbow Technology Inc. / Embedded Systems / IEEE Computer Society Press / John Wiley and Sons / A. Patel A. S. / /

Country

Belgium / /

Currency

pence / /

/

Facility

ECC library / National Institute of Standards and Technology / Atmel’s AVR Studio / AVR-based Sensor Nodes Dalin Chu Johann Großschädl Zhe Liu Shandong University / OPF library / Volker Müller Yang Zhang University of Luxembourg University / Natinal Institute of Standards / China University of Luxembourg University / TinyECC library / /

IndustryTerm

hardware/software co-design / few other public-key algorithms / addition law / high energy consumption / carefully-optimized software implementation / computer algebra systems / software uses / mJ energy / symmetric addition law / energy / Wireless Measurement System / energy consumption / target device / sensor networks / energy cost / energy requirements / energy figures / Energy-efficient implementation / computing / multiplication algorithms / /

OperatingSystem

TinyOS / /

Organization

Shandong University / China University / National Institute of Standards and Technology / Luxembourg University of Luxembourg / American Mathematical Society / Natinal Institute of Standards and Technology / Katholieke Universiteit Leuven / Department of Electrical Engineering / /

Person

Johann Großschädl Zhe Liu / Harold Edwards / Optimal Prime / /

Position

D. J. / Protection General / /

Product

Magma / Optimal Prime Fields (OPFs) / /

PublishedMedium

Bulletin of the American Mathematical Society / Cryptology ePrint Archive / Mathematics of Computation / Communications of the ACM / Lecture Notes in Computer Science / /

Technology

FPGA / RAM / Information Technology / Data Encryption / ECDH protocol / RISC processors / Montgomery multiplication algorithms / pdf / Cryptography / public key / ATmega128 processor / public-key algorithms / 8-bit AVR processors / 3 Algorithm / simulation / AVR processor / specific processor / extended Euclidean algorithm / /

URL

http /

SocialTag