Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
30
views
19
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,823
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
other
Author(s):
Erich Wenger
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
19
Record
: found
Abstract
: not found
Book Chapter
: not found
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems
Jean-Sébastien Coron
(1999)
0
comments
Cited
57
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Nils Gura
,
Arun L. Patel
,
Arvinderpal Wander
…
(2004)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks
An Liu
,
Peng Ning
(2008)
0
comments
Cited
42
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 290-306
DOI:
10.1007/978-3-642-38980-1_18
SO-VID:
4823089b-b05b-45c3-82f2-0fbd3363f3e3
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 218
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE
pp. 102
Private Database Queries Using Somewhat Homomorphic Encryption
pp. 290
Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography
pp. 441
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System
Similar content
2,823
MSP430 Advanced Power Optimizations: ULP Advisor Software and Energy Trace Technology (SLAA603)
Authors:
B Finch
,
W. Goh
Design of Wireless Electronic Scale Based On MSP430 Microprocessor
Authors:
Pinwei Zhu
,
Chunhua Hu
Design and Implementation of the PTZ Control System Based on MSP430 Single Chip Micyoco (SCM)
Authors:
Zhai Hong
See all similar
Cited by
5
Efficient Pairings and ECC for Embedded Systems
Authors:
Thomas Unterluggauer
,
Erich Wenger
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET
Authors:
Mukul Shukla
,
Brijendra Kumar Joshi
,
Upendra Singh
Lightweight Coprocessor for Koblitz Curves: 283-Bit ECC Including Scalar Conversion with only 4300 Gates
Authors:
Sujoy Sinha Roy
,
Kimmo Järvinen
,
Ingrid Verbauwhede
See all cited by