Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0. Available online at http://www. secg.org, 2000. ,
Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0. Available online at http://www. secg, 2010. ,
Exponentiation cryptosystems on the IBM PC, IBM Systems Journal, vol.29, issue.4, pp.526-538, 1990. ,
DOI : 10.1147/sj.294.0526
Resistance Against Differential Power Analysis For Elliptic Curve Cryptosystems, Cryptographic Hardware and Embedded Systems ? CHES'99, First International Workshop Proceedings, volume 1717 of Lecture Notes in Computer Science, pp.292-302, 1999. ,
DOI : 10.1007/3-540-48059-5_25
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.5695
MICAz Wireless Measurement System Available online at http://www.xbow.com/Products/Product_pdf_files ,
Securing the Elliptic Curve Montgomery Ladder against Fault Attacks, 2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pp.46-50, 2009. ,
DOI : 10.1109/FDTC.2009.35
State-of-the-Art of Secure ECC Implementations: A Survey on known Side- Channel Attacks and Countermeasures. In Hardware-Oriented Security and Trust - HOST 2010, 3rd IEEE International Symposium Proceedings, pp.76-87, 2010. ,
Optimize Elliptic Curve Cryptography for MSP430 Processor, 2011. ,
Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ), Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings, pp.133-147, 2004. ,
DOI : 10.1007/978-3-540-28632-5_10
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings, volume 3156 of Lecture Notes in Computer Science, pp.119-132, 2004. ,
DOI : 10.1007/978-3-540-28632-5_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.585.9481
Guide to Elliptic Curve Cryptography, 2004. ,
An ECDSA Processor for RFID Authentication, Proceedings, pp.189-202, 2010. ,
DOI : 10.1007/978-3-642-16822-2_16
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation, Progress in Cryptology -AFRICACRYPT 2011 Fourth International Conference on Cryptology in Africa Proceedings, volume 6737 of Lecture Notes in Computer Science, pp.170-187, 2011. ,
DOI : 10.1109/12.869328
Low-resource ECDSA implementation for passive RFID tags, 2010 17th IEEE International Conference on Electronics, Circuits and Systems, pp.1236-1239, 2010. ,
DOI : 10.1109/ICECS.2010.5724742
Analyzing and comparing Montgomery multiplication algorithms, IEEE Micro, vol.16, issue.3, pp.26-33, 1996. ,
DOI : 10.1109/40.502403
TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008), pp.245-256, 2008. ,
DOI : 10.1109/IPSN.2008.47
Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers, Workshop on the Security of the Internet of Things -SOCIOT 2010, 1st International Workshop Proceedings. IEEE Computer Society, 2010. ,
PIC24FJ128GA010 Family Data Sheet Available online at http: //www.microchip.com, DS39747E, 2009. ,
dsPIC30F6010A/6015 Data Sheet Available online at http://www. microchip.com, DS70150E, 2011. ,
MPLAB Integrated Development Environment Available online at http://www.microchip.com, 2011. ,
Modular multiplication without trial division, Mathematics of Computation, vol.44, issue.170, pp.519-521, 1985. ,
DOI : 10.1090/S0025-5718-1985-0777282-X
URL : http://www.ams.org/mcom/1985-44-170/S0025-5718-1985-0777282-X/S0025-5718-1985-0777282-X.pdf
The Moteiv Wireless Sensor Networks Website ,
Optimizing Multiprecision Multiplication for Public Key Cryptography, Report, 2007. ,
Multiprecision Integer and Rational Arithmetic C/C++ Library, 2011. ,
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks, Wireless Sensor Networks 5th European Conference Proceedings., volume 4913 of Lecture Notes in Computer Science, pp.305-320, 2008. ,
DOI : 10.1007/978-3-540-77690-1_19
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes, Security and Privacy in Ad-hoc and Sensor Networks 4th European Workshop Proceedings., volume 4572 of Lecture Notes in Computer Science, pp.73-86, 2007. ,
DOI : 10.1007/978-3-540-73275-4_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.5269
Simple Power Analysis of Unified Code for ECC Double and Add, Cryptographic Hardware and Embedded Systems ? CHES 2004, 6th International Workshop Proceedings, volume 3156 of Lecture Notes in Computer Science, pp.191-204, 2004. ,
DOI : 10.1007/978-3-540-28632-5_14
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices, pp.92-106, 2010. ,
DOI : 10.1109/ICCD.2009.5413128
Efficient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks, 7th Workshop on Optimizations for DSP and Embedded Systems (ODES-7), pp.7-15, 2009. ,