Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device (original) (raw)

Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography

Andrei Gurtov

2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

View PDFchevron_right

High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor

Kavya Karumudi

Communications, IEE …, 2001

View PDFchevron_right

An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor

Tugrul Yanik

2000

View PDFchevron_right

ELLIPTIC CURVE ALGORITHM USAGE IN WIRELESS SECURITY WITH PUBLIC KEY CRYPTOGRAPHY

GJESR Journal

View PDFchevron_right

An High-Speed ECC-based Wireless Authentication Protocol

Murat Aydos

View PDFchevron_right

Embedded end-to-end wireless security with ECDH key exchange

Arun Patel

2003 46th Midwest Symposium on Circuits and Systems

View PDFchevron_right

Application of Elliptic Curves Cryptography In Wireless Communications Security

Mohammad Ghamgosar

JOURNAL OF APPLIED …, 2006

View PDFchevron_right

Performance Improvement of IEEE 802.16/Wimax Using Elliptic Curve Cryptography

kapil hande

ijcsit.com

View PDFchevron_right

Efficient implementation of elliptic curve cryptography in wireless sensors

Leonardo Oliveira

Advances in Mathematics of Communications, 2010

View PDFchevron_right

An efficient elliptic curve cryptography based authenticated key agreement protocol for wireless LAN security

Mohammad Azim

HPSR. 2005 Workshop on High Performance Switching and Routing, 2005., 2000

View PDFchevron_right

A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN

Lamia chaari

International Journal of RFID Security and Cryptography, 2014

View PDFchevron_right

Elliptic Curve Cryptography Based Wireless Authentication Protocol

daud jhoni

View PDFchevron_right

A Review on Elliptic Curve Cryptography for Embedded Systems

Rahat Siddiqui

arXiv preprint arXiv:1107.3631, 2011

View PDFchevron_right

A Fast and Secure Elliptic Curve Based Authenticated Key Agreement Protocol For Low Power Mobile Communications

bachar elhassan

The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007

View PDFchevron_right

Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks

Turki al-Somani

International Journal of RFID Security and Cryptography, 2013

View PDFchevron_right

Security through Elliptic Curves for Wireless Network in Mobile Devices

EKAMBARAM KESAVULU REDDY

View PDFchevron_right

Article Extending the IEEE 802.15.4 Security Suite with a Compact Implementation of the NIST P-192/B-163 Elliptic Curves

Abdellah Touhafi

2013

View PDFchevron_right

Implementing Network Security Protocols based on Elliptic Curve Cryptography

Murat Aydos

1999

View PDFchevron_right

A Software Library for Elliptic Curve Cryptography

Christos Zaroliagis

Lecture Notes in Computer Science, 2002

View PDFchevron_right

A Brief Analysis on Key Management Schemes using Elliptic Curve Cryptography in Wireless Sensor Network

Robinchandra Usham

View PDFchevron_right

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the El …

Konstantinos Chalkias

V International Enformatika …, 2005

View PDFchevron_right

Security Through Elliptic Curves for Wireless Networks in Mobile Devices

EKAMBARAM KESAVULU REDDY

2019

View PDFchevron_right

Performance Analysis of Elliptic Curve Cryptography in Secure Socket Layer & Wireless Security

vipul Gupta

metronu.ulb.ac.be

View PDFchevron_right

Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

IOSR Journals

View PDFchevron_right

Elliptic Curve Cryptography and Its Applications to Mobile Devices

Anh Tuan Vo

View PDFchevron_right

Applications of Elliptic Curve Cryptography

Yogita Pagar

2015

View PDFchevron_right

A Fast Elliptic Curve Based Key Agreement Protocol-on-Chip (PoC) for Securing Networked Embedded Systems

Miguel Morales-sandoval, Claudia Feregrino-uribe

12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006

View PDFchevron_right

IJERT-An Implementation Of Elliptic Curve Cryptography

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right