{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,6]],"date-time":"2025-05-06T04:03:32Z","timestamp":1746504212276,"version":"3.40.4"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120867"},{"type":"electronic","value":"9783319120874"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12087-4_14","type":"book-chapter","created":{"date-parts":[[2014,10,24]],"date-time":"2014-10-24T19:32:54Z","timestamp":1414179174000},"page":"217-235","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Low-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR Processors"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Liu","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,10,25]]},"reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3934\/amc.2010.4.169","volume":"4","author":"DF Aranha","year":"2010","unstructured":"Aranha, D.F., Dahab, R., L\u00f3pez, J.C., Oliveira, L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 4(2), 169\u2013187 (2010)","journal-title":"Adv. Math. Commun."},{"key":"14_CR2","unstructured":"Atmel Corporation. 8-bit ARV$$^{\\textregistered }$$ Instruction Set. User Guide, July 2008. http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc0856.pdf"},{"key":"14_CR3","unstructured":"Atmel Corporation. 8-bit ARV$$^{\\textregistered }$$ Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet, June 2008. http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: New Diffie-Hellman Speed Records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006)"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Chu, D., Gro\u00dfsch\u00e4dl, J., Liu, Z., M\u00fcller, V., Zhang, Y.: Twisted Edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes. In: Xu, S., Zhao, Y. (eds.) Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography (AsiaPKC 2013), pp. 39\u201344. ACM Press (2013)","DOI":"10.1145\/2484389.2484398"},{"key":"14_CR6","unstructured":"Cohen, H., Frey, G.: Handbook of Elliptic and Hyperelliptic Curve Cryptography. Discrete Mathematics and Its Applications, vol. 34. Chapmann & Hall, Boca Raton (2006)"},{"key":"14_CR7","unstructured":"Crandall, R.E.: Method and apparatus for public key exchange in a cryptographic system, U.S. Patent No. 5,159,632, October 1992"},{"key":"14_CR8","unstructured":"Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet, January 2006. http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf"},{"key":"14_CR9","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-16644-0_21","volume-title":"Mobile Lightweight Wireless Systems","author":"G de Meulenaer","year":"2010","unstructured":"de Meulenaer, G., Standaert, F.-X.: Stealthy compromise of wireless sensor nodes with power analysis attacks. In: Chatzimisios, P., Verikoukis, C., Santamar\u00eda, I., Laddomada, M., Hoffmann, O. (eds.) MOBILIGHT 2010. LNICST, vol. 45, pp. 229\u2013242. Springer, Heidelberg (2010)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-642-31410-0_11","volume-title":"Progress in Cryptology - AFRICACRYPT 2012","author":"T Eisenbarth","year":"2012","unstructured":"Eisenbarth, T., Gong, Z., G\u00fcneysu, T., Heyse, S., Indesteege, S., Kerckhof, S., Koeune, F., Nad, T., Plos, T., Regazzoni, F., Standaert, F.-X., van Oldeneel tot Oldenzeel, L.: Compact implementation and performance evaluation of block ciphers in ATtiny devices. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 172\u2013187. Springer, Heidelberg (2012)"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-44647-8_11","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"RP Gallant","year":"2001","unstructured":"Gallant, R.P., Lambert, R.J., Vanstone, S.A.: Faster point multiplication on elliptic curves with efficient endomorphisms. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 190\u2013200. Springer, Heidelberg (2001)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Gro\u00dfsch\u00e4dl, J.: TinySA: a security architecture for wireless sensor networks. In: Diot, C., Ammar, M., S\u00e1 da Costa, C., Lopes, R.J., Leit\u00e3o, A.R., Feamster, N., Teixeira, R. (eds.) Proceedings of the 2nd International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2006), pp. 288\u2013289. ACM Press (2006)","DOI":"10.1145\/1368436.1368500"},{"key":"14_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/978-3-642-29222-4_44","volume-title":"Quality, Reliability, Security and Robustness in Heterogeneous Networks","author":"J Gro\u00dfsch\u00e4dl","year":"2012","unstructured":"Gro\u00dfsch\u00e4dl, J., Hudler, M., Koschuch, M., Kr\u00fcger, M., Szekely, A.: Smart elliptic curve cryptography for smart dust. In: Zhang, X., Qiao, D. (eds.) QShine 2010. LNICST, vol. 74, pp. 623\u2013634. Springer, Heidelberg (2012)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/978-3-540-45203-4_32","volume-title":"Applied Cryptography and Network Security","author":"J Gro\u00dfsch\u00e4dl","year":"2003","unstructured":"Gro\u00dfsch\u00e4dl, J., Kamendje, G.-A.: Architectural enhancements for montgomery multiplication on embedded RISC processors. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 418\u2013434. Springer, Heidelberg (2003)"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"14_CR16","volume-title":"Guide to Elliptic Curve Cryptography","author":"DR Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"key":"14_CR17","unstructured":"Heyse, S., von Maurich, I., Wild, A., Reuber, C., Rave, J., Poeppelmann, T., Paar, C.: Evaluation of SHA-3 candidates for 8-bit embedded processors. Presentation at the 2nd SHA-3 Candidate Conference, Santa Barbara, CA, USA, August 2010. http:\/\/csrc.nist.gov\/groups\/ST\/hash\/sha-3\/Round2\/Aug2010\/"},{"key":"14_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-642-38553-7_9","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2013","author":"M Hutter","year":"2013","unstructured":"Hutter, M., Schwabe, P.: NaCl on 8-Bit AVR microcontrollers. In: Youssef, A., Nitaj, A., Hassanien, A.E. (eds.) AFRICACRYPT 2013. LNCS, vol. 7918, pp. 156\u2013172. Springer, Heidelberg (2013)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/978-3-642-23951-9_30","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"M Hutter","year":"2011","unstructured":"Hutter, M., Wenger, E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 459\u2013474. Springer, Heidelberg (2011)"},{"key":"14_CR20","unstructured":"Kargl, A., Pyka, S., Seuschek, H.: Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008\/442 (2008). http:\/\/eprint.iacr.org"},{"issue":"3","key":"14_CR21","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"\u00c7K Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, \u00c7.K., Acar, T., Kaliski, B.S.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro 16(3), 26\u201333 (1996)","journal-title":"IEEE Micro"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-642-03944-7_9","volume-title":"Information Security Theory and Practice","author":"C Lederer","year":"2009","unstructured":"Lederer, C., Mader, R., Koschuch, M., Gro\u00dfsch\u00e4dl, J., Szekely, A., Tillich, S.: Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) Information Security Theory and Practice. LNCS, vol. 5746, pp. 112\u2013127. Springer, Heidelberg (2009)"},{"key":"14_CR23","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245\u2013256. IEEE Computer Society Press (2008)","DOI":"10.1109\/IPSN.2008.47"},{"key":"14_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Z., Gro\u00dfsch\u00e4dl, J.: New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers. Cryptology ePrint Archive, Report 2013\/882 (2013). http:\/\/eprint.iacr.org","DOI":"10.1007\/978-3-319-06734-6_14"},{"key":"14_CR25","volume-title":"Power Analysis Attacks: Revealing the Secrets of Smart Cards","author":"S Mangard","year":"2007","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power Analysis Attacks: Revealing the Secrets of Smart Cards. Springer, New York (2007)"},{"issue":"170","key":"14_CR26","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"PL Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular multiplication without trial division. Math. Comput. 44(170), 519\u2013521 (1985)","journal-title":"Math. Comput."},{"issue":"177","key":"14_CR27","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Oswald, E.: Enhancing simple power-analysis attacks on elliptic curve cryptosystems. In: Kaliski, B.S., Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 82\u201397. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-36400-5_8"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/11602897_15","volume-title":"Information and Communications Security","author":"Y Sakai","year":"2005","unstructured":"Sakai, Y., Sakurai, K.: Simple power analysis on fast modular reduction with NIST recommended elliptic curves. In: Qing, S., Mao, W., L\u00f3pez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 169\u2013180. Springer, Heidelberg (2005)"},{"key":"14_CR30","unstructured":"Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007\/299 (2007). http:\/\/eprint.iacr.org"},{"key":"14_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-35416-8_5","volume-title":"Information Security Applications","author":"H Seo","year":"2012","unstructured":"Seo, H., Kim, H.: Multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 55\u201367. Springer, Heidelberg (2012)"},{"issue":"5","key":"14_CR32","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1093\/ietisy\/e91-d.5.1338","volume":"E91\u2013D","author":"SC Seo","year":"2008","unstructured":"Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: efficient elliptic curve cryptography implementation over GF($$2^m$$) on 8-bit Micaz mote. IEICE Trans. Inf. Syst E91\u2013D(5), 1338\u20131347 (2008)","journal-title":"IEICE Trans. Inf. Syst"},{"key":"14_CR33","unstructured":"Solinas, J.A.: Generalized Mersenne numbers. Technical report CORR-99-39, Centre for Applied Cryptographic Research (CACR), University of Waterloo, Waterloo, Canada (1999)"},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/11894063_28","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2006","author":"D Stebila","year":"2006","unstructured":"Stebila, D., Th\u00e9riault, N.: Unified point addition formul\u00e6 and side-channel attacks. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 354\u2013368. Springer, Heidelberg (2006)"},{"key":"14_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol. 4913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"14_CR36","unstructured":"Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11\u201316 (2007). http:\/\/arxiv.org\/abs\/0903.3900"},{"key":"14_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73275-4_6","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L Uhsadel","year":"2007","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: Enabling full-size public-key algorithms on 8-bit sensor nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol. 4572, pp. 73\u201386. Springer, Heidelberg (2007)"},{"key":"14_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-28632-5_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"CD Walter","year":"2004","unstructured":"Walter, C.D.: Simple power analysis of unified code for ECC double and add. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 191\u2013204. Springer, Heidelberg (2004)"},{"key":"14_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/11935308_37","volume-title":"Information and Communications Security","author":"H Wang","year":"2006","unstructured":"Wang, H., Li, Q.: Efficient implementation of public key cryptosystems on mote sensors (short paper). In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 519\u2013528. Springer, Heidelberg (2006)"},{"key":"14_CR40","doi-asserted-by":"crossref","unstructured":"Wenger, E., Gro\u00dfsch\u00e4dl, J.: An 8-bit AVR-based elliptic curve cryptographic RISC processor for the Internet of things. In: Proceedings of the 45th Annual IEEE\/ACM International Symposium on Microarchitecture Workshops (MICROW 2012), pp. 39\u201346. IEEE Computer Society Press (2012)","DOI":"10.1109\/MICROW.2012.20"},{"key":"14_CR41","series-title":"International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-0-387-35528-3_5","volume-title":"Smart Card Research and Advanced Applications","author":"AD Woodbury","year":"2000","unstructured":"Woodbury, A.D., Bailey, D.V., Paar, C.: Elliptic curve cryptography on smart cards without coprocessors. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) Smart Card Research and Advanced Applications. International Federation for Information Processing, vol. 180, pp. 71\u201392. Kluwer Academic Publishers, Amsterdam (2000)"},{"issue":"2","key":"14_CR42","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/ip-cdt:20020235","volume":"149","author":"T Yan\u0131k","year":"2002","unstructured":"Yan\u0131k, T., Sava\u015f, E., Ko\u00e7, \u00c7.K.: Incomplete reduction in modular arithmetic. IEE Proc. Comput. Digit. Tech. 149(2), 46\u201352 (2002)","journal-title":"IEE Proc. Comput. Digit. Tech."},{"key":"14_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Gro\u00dfsch\u00e4dl, J.: Efficient prime-field arithmetic for elliptic curve cryptography on wireless sensor nodes. In: Proceedings of the 1st International Conference on Computer Science and Network Technology (ICCSNT 2011), vol. 1, pp. 459\u2013466. IEEE (2011)","DOI":"10.1109\/ICCSNT.2011.6181997"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12087-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T13:13:48Z","timestamp":1746450828000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12087-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319120867","9783319120874"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12087-4_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"25 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}