TinyECC

TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC 2.0 is a software package providing ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. It provides a digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme (ECIES). TinyECC uses a number of optimization switches, which can turn specific optimizations on or off based on developer’s needs.


References in zbMATH (referenced in 15 articles )

Showing results 1 to 15 of 15.
Sorted by year (citations)

  1. Shi, Qiong; Qin, Li; Song, Lipeng; Zhang, Rongping; Jia, Yanfeng: A dynamic programming model for internal attack detection in wireless sensor networks (2017)
  2. Roy, Debapriya Basu; Das, Poulami; Mukhopadhyay, Debdeep: ECC on your fingertips: a single instruction approach for lightweight ECC design in GF(p) (2016)
  3. Düll, Michael; Haase, Björn; Hinterwälder, Gesine; Hutter, Michael; Paar, Christof; Sánchez, Ana Helena; Schwabe, Peter: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (2015)
  4. Hinterwälder, Gesine; Moradi, Amir; Hutter, Michael; Schwabe, Peter; Paar, Christof: Full-size high-security ECC implementation on MSP430 microcontrollers (2015)
  5. Liu, Zhe; Wenger, Erich; Großschädl, Johann: Mote-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks (2014)
  6. Wenger, Erich; Unterluggauer, Thomas; Werner, Mario: 8/16/32 shades of elliptic curve cryptography on embedded processors (2013)
  7. Duan, Mei-jiao; Xu, Jing: An efficient location-based compromise-tolerant key management scheme for sensor networks (2011)
  8. Bahi, Jacques M.; Guyeux, Christophe; Makhoul, Abdallah: Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach (2010)
  9. Fan, Xinxin; Gong, Guang: Accelerating signature-based broadcast authentication for wireless sensor networks (2010)
  10. Liu, Donggang: Efficient and distributed access control for sensor networks (2010) ioport
  11. Simplício, Marcos A. jun.; Barreto, Paulo S.L.M.; Margi, Cintia B.; Carvalho, Tereza C.M.B.: A survey on key management mechanisms for distributed wireless sensor networks (2010)
  12. Szalachowski, P.; Ksiezopolski, B.; Kotulski, Z.: CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (2010)
  13. Zhang, Youtao; Yang, Jun; Vu, Hai T.; Wu, Yizhi: The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs (2010) ioport
  14. Kozma, William; Lazos, Loukas: Dealing with liars: misbehavior identification via Rényi-Ulam games (2009)
  15. Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport