TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC 2.0 is a software package providing ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. It provides a digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme (ECIES). TinyECC uses a number of optimization switches, which can turn specific optimizations on or off based on developer’s needs.

References in zbMATH (referenced in 18 articles )

Showing results 1 to 18 of 18.
Sorted by year (citations)

  1. Hutter, Michael; Wenger, Erich: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors (2018)
  2. Nascimento, Erick; Chmielewski, Łukasz; Oswald, David; Schwabe, Peter: Attacking embedded ECC implementations through CMOV side channels (2017)
  3. Shi, Qiong; Qin, Li; Song, Lipeng; Zhang, Rongping; Jia, Yanfeng: A dynamic programming model for internal attack detection in wireless sensor networks (2017)
  4. Roy, Debapriya Basu; Das, Poulami; Mukhopadhyay, Debdeep: ECC on your fingertips: a single instruction approach for lightweight ECC design in (\mathrmGF(p)) (2016)
  5. Düll, Michael; Haase, Björn; Hinterwälder, Gesine; Hutter, Michael; Paar, Christof; Sánchez, Ana Helena; Schwabe, Peter: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (2015)
  6. Hinterwälder, Gesine; Moradi, Amir; Hutter, Michael; Schwabe, Peter; Paar, Christof: Full-size high-security ECC implementation on MSP430 microcontrollers (2015)
  7. Liu, Zhe; Wenger, Erich; Großschädl, Johann: Mote-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks (2014)
  8. Wenger, Erich: A lightweight ATmega-based application-specific instruction-set processor for elliptic curve cryptography (2013)
  9. Wenger, Erich; Unterluggauer, Thomas; Werner, Mario: 8/16/32 shades of elliptic curve cryptography on embedded processors (2013)
  10. Duan, Mei-jiao; Xu, Jing: An efficient location-based compromise-tolerant key management scheme for sensor networks (2011)
  11. Bahi, Jacques M.; Guyeux, Christophe; Makhoul, Abdallah: Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach (2010)
  12. Fan, Xinxin; Gong, Guang: Accelerating signature-based broadcast authentication for wireless sensor networks (2010)
  13. Liu, Donggang: Efficient and distributed access control for sensor networks (2010) ioport
  14. Simplício, Marcos A. jun.; Barreto, Paulo S. L. M.; Margi, Cintia B.; Carvalho, Tereza C. M. B.: A survey on key management mechanisms for distributed wireless sensor networks (2010)
  15. Szalachowski, P.; Ksiezopolski, B.; Kotulski, Z.: CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (2010)
  16. Zhang, Youtao; Yang, Jun; Vu, Hai T.; Wu, Yizhi: The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs (2010) ioport
  17. Kozma, William; Lazos, Loukas: Dealing with liars: misbehavior identification via Rényi-Ulam games (2009)
  18. Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport