Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

7 results
Keywords : ECC
Image document

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Christian Hanser , Christian Wagner
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers hal-01506561v1
Image document

Cryptanalysis of a SIP Authentication Scheme

Fuwen Liu , Hartmut Koenig
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers hal-01596196v1
Image document

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines

Michael Hutter , Martin Feldhofer , Johannes Wolkerstorfer
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.144-159, ⟨10.1007/978-3-642-21040-2_10⟩
Conference papers hal-01573313v1
Image document

Evaluating 16-Bit Processors for Elliptic Curve Cryptography

Erich Wenger , Mario Werner
10th Smart Card Research and Advanced Applications (CARDIS), Sep 2011, Leuven, Belgium. pp.166-181, ⟨10.1007/978-3-642-27257-8_11⟩
Conference papers hal-01596311v1
Image document

A Pre-processing Composition for Secret Key Recovery on Android Smartphone

Yuto Nakano , Youssef Souissi , Robert Nguyen , Laurent Sauvage , Jean-Luc Danger , et al.
8th IFIP International Workshop on Information Security Theory and Practice (WISTP), Jun 2014, Heraklion, Crete, Greece. pp.76-91, ⟨10.1007/978-3-662-43826-8_6⟩
Conference papers hal-01400921v1
Image document

Shifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices

Leandro Marin , Antonio J. Jara , Antonio Skarmeta
1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienna, Austria. pp.205-219, ⟨10.1007/978-3-642-23300-5_16⟩
Conference papers hal-01590400v1
Image document

Cryptographic Key Exchange in IPv6-Based Low Power, Lossy Networks

Panagiotis Ilia , George Oikonomou , Theo Tryfonas
7th International Workshop on Information Security THeory and Practice (WISTP), May 2013, Heraklion, Greece. pp.34-49, ⟨10.1007/978-3-642-38530-8_3⟩
Conference papers hal-01485932v1