TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. TinyECC 2.0 is a software package providing ECC-based PKC operations that can be flexibly configured and integrated into sensor network applications. It provides a digital signature scheme (ECDSA), a key exchange protocol (ECDH), and a public key encryption scheme (ECIES). TinyECC uses a number of optimization switches, which can turn specific optimizations on or off based on developer’s needs.

References in zbMATH (referenced in 20 articles )

Showing results 1 to 20 of 20.
Sorted by year (citations)

  1. Hutter, Michael; Wenger, Erich: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors (2020)
  2. Wang, Linjie; Tian, Youliang; Zhang, Duo; Lu, Yanhua: Constant-round authenticated and dynamic group key agreement protocol for D2D group communications (2019)
  3. Hutter, Michael; Wenger, Erich: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors (2018)
  4. Nascimento, Erick; Chmielewski, Łukasz; Oswald, David; Schwabe, Peter: Attacking embedded ECC implementations through CMOV side channels (2017)
  5. Shi, Qiong; Qin, Li; Song, Lipeng; Zhang, Rongping; Jia, Yanfeng: A dynamic programming model for internal attack detection in wireless sensor networks (2017)
  6. Roy, Debapriya Basu; Das, Poulami; Mukhopadhyay, Debdeep: ECC on your fingertips: a single instruction approach for lightweight ECC design in (\mathrmGF(p)) (2016)
  7. Düll, Michael; Haase, Björn; Hinterwälder, Gesine; Hutter, Michael; Paar, Christof; Sánchez, Ana Helena; Schwabe, Peter: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers (2015)
  8. Hinterwälder, Gesine; Moradi, Amir; Hutter, Michael; Schwabe, Peter; Paar, Christof: Full-size high-security ECC implementation on MSP430 microcontrollers (2015)
  9. Liu, Zhe; Wenger, Erich; Großschädl, Johann: Mote-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks (2014)
  10. Wenger, Erich: A lightweight ATmega-based application-specific instruction-set processor for elliptic curve cryptography (2013)
  11. Wenger, Erich; Unterluggauer, Thomas; Werner, Mario: 8/16/32 shades of elliptic curve cryptography on embedded processors (2013)
  12. Duan, Mei-jiao; Xu, Jing: An efficient location-based compromise-tolerant key management scheme for sensor networks (2011)
  13. Bahi, Jacques M.; Guyeux, Christophe; Makhoul, Abdallah: Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach (2010)
  14. Fan, Xinxin; Gong, Guang: Accelerating signature-based broadcast authentication for wireless sensor networks (2010)
  15. Liu, Donggang: Efficient and distributed access control for sensor networks (2010) ioport
  16. Simplício, Marcos A. jun.; Barreto, Paulo S. L. M.; Margi, Cintia B.; Carvalho, Tereza C. M. B.: A survey on key management mechanisms for distributed wireless sensor networks (2010)
  17. Szalachowski, P.; Ksiezopolski, B.; Kotulski, Z.: CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks (2010)
  18. Zhang, Youtao; Yang, Jun; Vu, Hai T.; Wu, Yizhi: The design and evaluation of interleaved authentication for filtering false reports in multipath routing WSNs (2010) ioport
  19. Kozma, William; Lazos, Loukas: Dealing with liars: misbehavior identification via Rényi-Ulam games (2009)
  20. Roman, Rodrigo; Alcaraz, Cristina; Lopez, Javier: A survey of cryptographic primitives and implementations for hardware-constrained sensor network nodes (2007) ioport