Secure Elliptic Curve generation and key establishment on a 802.11 WLAN embedded device (original) (raw)
Related papers
Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography
2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor
Communications, IEE …, 2001
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor
2000
ELLIPTIC CURVE ALGORITHM USAGE IN WIRELESS SECURITY WITH PUBLIC KEY CRYPTOGRAPHY
An High-Speed ECC-based Wireless Authentication Protocol
Embedded end-to-end wireless security with ECDH key exchange
2003 46th Midwest Symposium on Circuits and Systems
Application of Elliptic Curves Cryptography In Wireless Communications Security
JOURNAL OF APPLIED …, 2006
Performance Improvement of IEEE 802.16/Wimax Using Elliptic Curve Cryptography
ijcsit.com
Efficient implementation of elliptic curve cryptography in wireless sensors
Advances in Mathematics of Communications, 2010
HPSR. 2005 Workshop on High Performance Switching and Routing, 2005., 2000
International Journal of RFID Security and Cryptography, 2014
Elliptic Curve Cryptography Based Wireless Authentication Protocol
A Review on Elliptic Curve Cryptography for Embedded Systems
arXiv preprint arXiv:1107.3631, 2011
The 2007 International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST 2007), 2007
International Journal of RFID Security and Cryptography, 2013
Security through Elliptic Curves for Wireless Network in Mobile Devices
2013
Implementing Network Security Protocols based on Elliptic Curve Cryptography
1999
A Software Library for Elliptic Curve Cryptography
Lecture Notes in Computer Science, 2002
V International Enformatika …, 2005
Security Through Elliptic Curves for Wireless Networks in Mobile Devices
2019
Performance Analysis of Elliptic Curve Cryptography in Secure Socket Layer & Wireless Security
metronu.ulb.ac.be
Elliptic Curve Cryptography and Its Applications to Mobile Devices
Applications of Elliptic Curve Cryptography
2015
Miguel Morales-sandoval, Claudia Feregrino-uribe
12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006
IJERT-An Implementation Of Elliptic Curve Cryptography
International Journal of Engineering Research and Technology (IJERT), 2013