2013
DOI: 10.1007/978-3-642-35668-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0
1

Year Published

2013
2013
2017
2017

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 10 publications
(13 citation statements)
references
References 18 publications
0
12
0
1
Order By: Relevance
“…This parallelization is used in Wu et al and Lim and Lee 16,17 by partitioning the scalar into v equal-length bit substrings on multiprocessor architectures. This technique is also used on sensor nodes in Shou et al 18 by partitioning the scalar in v blocks for v sensor nodes, where each sensor node computes 1 block. At the point arithmetic level, some works already propose the parallelization of ECC formulas for architectures such as the well-known SIMD.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…This parallelization is used in Wu et al and Lim and Lee 16,17 by partitioning the scalar into v equal-length bit substrings on multiprocessor architectures. This technique is also used on sensor nodes in Shou et al 18 by partitioning the scalar in v blocks for v sensor nodes, where each sensor node computes 1 block. At the point arithmetic level, some works already propose the parallelization of ECC formulas for architectures such as the well-known SIMD.…”
Section: Related Workmentioning
confidence: 99%
“…15,[18][19][20] Our goal is to avoid the storage of precomputation points. We first propose a scalar reduction technique to run fast computation of scalar multiplication.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, sensor nodes might suffer external attacks during computation. In this paper we present our new fault tolerant parallel computing scheme for elliptic curve cryptography in wireless sensor networks, which is actually the following of our research published in [12].…”
Section: Introductionmentioning
confidence: 99%