Sciweavers

76 search results - page 1 / 16
» An elliptic curve authenticated key exchange based approach ...
Sort
View
71
Voted
KES
1999
Springer
15 years 3 months ago
An elliptic curve authenticated key exchange based approach to key infrastructure
P. Koduri, A. Mahajan, P. Montague, P. Moseley
102
Voted
PERCOM
2005
ACM
15 years 10 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
119
Voted
COMCOM
2011
14 years 6 months ago
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off between ...
Leonardo B. Oliveira, Diego F. Aranha, Conrado Por...
111
Voted
ESORICS
2004
Springer
15 years 4 months ago
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
This work presents a practical public-key encryption scheme that offers security under adaptive chosen-ciphertext attack (CCA) and has pseudo-random ciphertexts, i.e. ciphertexts ...
Bodo Möller