History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 17 of 17 total

AISC, 56-66(2010)
1
A cryptographic processor for arbitrary elliptic curves over $GF(2^{m})$. (English)
Int. J. Embed. Syst. 3, No. 4, 241-255 (2008).
2
Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs. (English)
IEEE Micro 25, No.02, 52-59 (2005).
3
Sizzle: a standards-based end-to-end security architecture for the embedded internet. (English)
Pervasive Mobile Comput. 1, No. 4, 425-445 (2005).
4
Sizzle: a standards-based end-to-end security architecture for the embedded internet. (English)
Pervasive Mobile Comput. 1, No. 4, 425-445 (2005).
5
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. (English)
PerCom, 324-328(2005)
6
Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors. (English)
ASAP, 343-349(2005)
7
Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper). (English)
PerCom, 247-256(2005)
8
Comparing elliptic curve cryptography and RSA on 8-bit CPUs. (English)
Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11‒13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 119-132 (2004).
9
Integrating elliptic curve cryptography into the web’s security infrastructure. (English)
WWW (Alternate Track Papers & Posters), 402-403(2004)
10
A Public-Key Cryptographic Processor for RSA and ECC. (English)
ASAP, 98-110(2004)
11
Generic $\text{GF}(2^m)$ arithmetic in software and its application to ECC. (English)
Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9‒11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 79-92 (2003).
12
A Cryptograhpic Processor for Arbitrary Elliptic Curves over. (English)
ASAP, 444-454(2003)
13
An end-to-end systems approach to elliptic curve cryptography. (English)
Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 349-365 (2002).
Classification: E.4 E.3 C.1
14
Generic implementations of elliptic curve cryptography using partial reduction. (English)
ACM Conference on Computer and Communications Security, 108-116(2002)
15
Performance analysis of elliptic curve cryptography for SSL. (English)
Workshop on Wireless Security, 87-94(2002)
16
Elliptic curve cryptography on a Palm OS device. (English)
Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 502-513 (2001).
17
first | previous | 1 | next | last

Result 1 to 17 of 17 total