{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T02:46:50Z","timestamp":1763347610962,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540494966"},{"type":"electronic","value":"9783540494973"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11935308_37","type":"book-chapter","created":{"date-parts":[[2006,11,15]],"date-time":"2006-11-15T06:26:42Z","timestamp":1163572002000},"page":"519-528","source":"Crossref","is-referenced-by-count":84,"title":["Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)"],"prefix":"10.1007","author":[{"given":"Haodong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation. In: ICICS 1997, pp. 282\u2013290. Springer, Heidelberg (1997)","DOI":"10.1007\/BFb0028484"},{"key":"37_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/3-540-49649-1_6","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"H. Cohen","year":"1998","unstructured":"Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 51\u201365. Springer, Heidelberg (1998)"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Gupta, V., Millard, M., Fung, S., Zhu, Y., Gura, N., Eberle, H., Shantz, S.: Sizzle: A standards-based end-to-end security architecture for the embedded internet. In: PerCom, Kauai (March 2005)","DOI":"10.1016\/j.pmcj.2005.08.005"},{"key":"37_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"37_CR5","unstructured":"Koc, C.K.: High-speed rsa implementation, rsa laboratories technical report tr-201, version 2.0 (November 22, 1994)"},{"key":"37_CR6","unstructured":"Koc, C.K.: High-speed rsa implementation. RSA Lab TR201 (November 1994)"},{"key":"37_CR7","unstructured":"Liu, A., Ning, P.: Tinyecc: Elliptic curve cryptography for sensor networks (September 15, 2005)"},{"key":"37_CR8","unstructured":"Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In: SECON, Santa Clara, CA (October 2004)"},{"issue":"170","key":"37_CR9","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P. Montgomery","year":"1985","unstructured":"Montgomery, P.: Modular multiplication without trial division. Mathematics of Communication\u00a044(170), 519\u2013521 (1985)","journal-title":"Mathematics of Communication"},{"key":"37_CR10","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1051\/ita\/1990240605311","volume":"24","author":"F. Morain","year":"1990","unstructured":"Morain, F., Olivos, J.: Speeding up the computations on an elliptic curve using addition-subtraction chains. Theoretical Informatics and Applications\u00a024, 531\u2013543 (1990)","journal-title":"Theoretical Informatics and Applications"},{"key":"37_CR11","unstructured":"Chang Shantz, S.: From euclid\u2019s gcd to montgomery multiplication to the great divide. Technical report, Sun Lab TR-2001-95 (June 2001)"},{"key":"37_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/11776178_19","volume-title":"Distributed Computing in Sensor Systems","author":"H. Wang","year":"2006","unstructured":"Wang, H., Li, Q.: Distributed user access control in sensor networks. In: Gibbons, P.B., Abdelzaher, T., Aspnes, J., Rao, R. (eds.) DCOSS 2006. LNCS, vol.\u00a04026, pp. 305\u2013320. Springer, Heidelberg (2006)"},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on MicaZ and TelosB Motes. Technical Report WM-CS-2006, College of William and Mary (October 2006)","DOI":"10.1007\/11935308_37"},{"key":"37_CR14","doi-asserted-by":"crossref","unstructured":"Wang, H., Sheng, B., Li, Q.: Elliptic curve cryptography based access control in sensor networks. Int. Journal of Security and Networks\u00a01(2) (2006)","DOI":"10.1504\/IJSN.2006.011772"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11935308_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:10:06Z","timestamp":1566763806000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11935308_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540494966","9783540494973"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11935308_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}