{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T04:21:59Z","timestamp":1747196519462,"version":"3.40.5"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319130651"},{"type":"electronic","value":"9783319130668"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-13066-8_8","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T23:26:21Z","timestamp":1416007581000},"page":"123-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Energy Budget Analysis for Signature Protocols on a Self-powered Wireless Sensor Node"],"prefix":"10.1007","author":[{"given":"Krishna","family":"Pabbuleti","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Mane","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Schaumont","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,15]]},"reference":[{"key":"8_CR1","unstructured":"Anagear Power Management. http:\/\/www.anagear.com\/content\/ANG1010"},{"key":"8_CR2","unstructured":"Texas Instruments Low Power 2.4\u00a0GHz RF Transceiver. http:\/\/www.ti.com\/lit\/ds\/swrs040c\/swrs040c.pdf"},{"key":"8_CR3","unstructured":"Texas Instruments MSP430F5438A Mixed Signal Microcontroller. http:\/\/www.ti.com\/lit\/ds\/symlink\/msp430f5438a.pdf"},{"key":"8_CR4","unstructured":"Texas Instruments MSP430x5xx and MSP430x6xx Family User\u2019s Guide 2013. http:\/\/www.ti.com\/lit\/ug\/slau208m\/slau208m.pdf"},{"key":"8_CR5","unstructured":"Xilinx Spartan-6 FPGA LX9 MicroBoard. http:\/\/www.em.avnet.com\/en-us\/design\/drc\/Pages\/Xilinx-Spartan-6-FPGA-LX9-MicroBoard.aspx"},{"key":"8_CR6","unstructured":"Ateniese, G., Bianchi, G., Capossele, A., Petrioli, C.: Low-cost standard signatures in wireless sensor networks: a case for reviving pre-computation techniques? In: NDSS (2013)"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-642-41332-2_7","volume-title":"Radio Frequency Identification","author":"L Batina","year":"2013","unstructured":"Batina, L., Das, A., Ege, B., Kavun, E.B., Mentens, N., Paar, C., Verbauwhede, I., Yal\u00e7in, T.: Dietary recommendations for lightweight block ciphers: power, energy and area analysis of recently developed architectures. In: Hutter, M., Schmidt, J.-M. (eds.) RFIDsec 2013. LNCS, vol. 8262, pp. 101\u2013110. Springer, Heidelberg (2013)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-540-88702-7_3","volume-title":"Post-Quantum Cryptography","author":"J Buchmann","year":"2009","unstructured":"Buchmann, J., Dahmen, E., Szydlo, M.: Hash-based digital signature schemes. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 35\u201393. Springer, Heidelberg (2009). http:\/\/dx.doi.org\/10.1007\/978-3-540-88702-7_3"},{"key":"8_CR9","unstructured":"Buettner, M., Greenstein, B., Wetherall, D.: Dewdrop: An energy-aware runtime for computational RFID. In: NSDI (2011)"},{"key":"8_CR10","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-1-4614-3535-8_42","volume-title":"Innovations and Advances in Computer, Information, Systems Sciences, and Engineering","author":"V Cervenka","year":"2013","unstructured":"Cervenka, V., Komosny, D., Malina, L., Mraz, L.: Energy efficient public key cryptography in wireless sensor networks. In: Elleithy, K., Sobh, T. (eds.) Innovations and Advances in Computer, Information, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol. 152, pp. 497\u2013509. Springer, New York (2013). http:\/\/dx.doi.org\/10.1007\/978-1-4614-3535-8_42"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11586821_8","volume-title":"Cryptography and Coding","author":"C Dods","year":"2005","unstructured":"Dods, C., Smart, N.P., Stam, M.: Hash based digital signature schemes. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96\u2013115. Springer, Heidelberg (2005). http:\/\/dx.doi.org\/10.1007\/11586821_8"},{"key":"8_CR12","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2003)"},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1007\/11596042_108","volume-title":"Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops","author":"E Lai","year":"2005","unstructured":"Lai, E., Redfern, A., Wright, P.: Vibration powered battery-assisted passive RFID tag. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1058\u20131068. Springer, Heidelberg (2005)"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN \u201908, pp. 245\u2013256. IEEE Computer Society, Washington, DC (2008). http:\/\/dx.doi.org\/10.1109\/IPSN.2008.47","DOI":"10.1109\/IPSN.2008.47"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-41332-2_10","volume-title":"Radio Frequency Identification","author":"D Mane","year":"2013","unstructured":"Mane, D., Schaumont, P.: Energy-architecture tuning for ECC-based RFID tags. In: Hutter, M., Schmidt, J.-M. (eds.) RFIDsec 2013. LNCS, vol. 8262, pp. 145\u2013158. Springer, Heidelberg (2013)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"de Meulenaer, G., Gosset, F., Standaert, O.X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: 2008 IEEE International Conference on Wireless and Mobile Computing Networking and Communications, WIMOB \u201908, pp. 580\u2013585, October 2008","DOI":"10.1109\/WiMob.2008.16"},{"issue":"9","key":"8_CR17","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1109\/JPROC.2008.927494","volume":"96","author":"P Mitcheson","year":"2008","unstructured":"Mitcheson, P., Yeatman, E., Rao, G., Holmes, A., Green, T.: Energy harvesting from human and machine motion for wireless electronic devices. Proc. IEEE 96(9), 1457\u20131486 (2008)","journal-title":"Proc. IEEE"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Kong, N., Cochran, T., Ha, D., Lin, H., Inman, D.: A self-powered power management circuit for energy harvested by a piezoelectric cantilever. In: Applied Power Electronics Conference and Exposition (APEC), 2010 Twenty-Fifth Annual IEEE, APEC2010 (2010). http:\/\/www.mics.ece.vt.edu\/Research\/Publications\/ByFaculty\/Papers\/Ha\/10APEC2010_Published.pdf","DOI":"10.1109\/APEC.2010.5433535"},{"key":"8_CR19","unstructured":"O\u2019Flynn, C.: OPENADC (2012). http:\/\/newae.com\/tiki-index.php?page=OpenADC"},{"key":"8_CR20","unstructured":"O\u2019Flynn, C.: Power analysis for cheapskates (2012). https:\/\/media.blackhat.com\/ad-12\/O%27Flynn\/bh-ad-12-for-cheapskates-o%27flynn-WP.pdf"},{"issue":"3","key":"8_CR21","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.comcom.2010.05.013","volume":"34","author":"LB Oliveira","year":"2011","unstructured":"Oliveira, L.B., Aranha, D.F., Gouv\u00eaa, C.P.L., Scott, M., C\u00e2mara, D.F., L\u00f3pez, J., Dahab, R.: TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks. Comput. Commun. 34(3), 485\u2013493 (2011)","journal-title":"Comput. Commun."},{"key":"8_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-642-25286-0_3","volume-title":"RFID","author":"C Pendl","year":"2012","unstructured":"Pendl, C., Pelnar, M., Hutter, M.: Elliptic curve cryptography on the WISP UHF RFID tag. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 32\u201347. Springer, Heidelberg (2012)"},{"key":"8_CR23","unstructured":"Raghunathan, V., Kansal, A., Hsu, J., Friedman, J., Srivastava, M.: Design considerations for solar energy harvesting wireless embedded systems. In: Proceedings of the 4th International Symposium on Information Processing in Sensor Networks, IPSN \u201905, IEEE Press, Piscataway, NJ, USA (2005). http:\/\/dl.acm.org\/citation.cfm?id=1147685.1147764"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Ransford, B., Sorber, J., Fu, K.: Mementos: system support for long-running computation on RFID-scale devices. In: ASPLOS, pp. 159\u2013170 (2011)","DOI":"10.1145\/1961296.1950386"},{"key":"8_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-540-85893-5_8","volume-title":"Smart Card Research and Advanced Applications","author":"S Rohde","year":"2008","unstructured":"Rohde, S., Eisenbarth, T., Dahmen, E., Buchmann, J., Paar, C.: Fast hash-based signatures on constrained devices. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 104\u2013117. Springer, Heidelberg (2008)"},{"key":"8_CR26","unstructured":"Struik, R.: AEAD ciphers for highly constrained networks. In: DIAC (2013). http:\/\/2013.diac.cr.yp.to\/slides\/struik.pdf"},{"issue":"2","key":"8_CR27","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSSC.2010.936667","volume":"2","author":"R Vullers","year":"2010","unstructured":"Vullers, R., Schaijk, R., Visser, H., Penders, J., Hoof, C.: Energy harvesting for autonomous wireless sensor networks. IEEE Solid State Circ. Mag. 2(2), 29\u201338 (2010)","journal-title":"IEEE Solid State Circ. Mag."},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Wander, A., Gura, N., Eberle, H., Gupta, V., Shantz, S.: Energy analysis of public-key cryptography for wireless sensor networks. In: 2005 Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005, pp. 324\u2013328, March 2005","DOI":"10.1109\/PERCOM.2005.18"},{"key":"8_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-17955-6_7","volume-title":"Information Security Applications","author":"E Wenger","year":"2011","unstructured":"Wenger, E., Feldhofer, M., Felber, N.: Low-resource hardware design of an elliptic curve processor for contactless devices. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 92\u2013106. Springer, Heidelberg (2011)"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-27257-8_11","volume-title":"Smart Card Research and Advanced Applications","author":"E Wenger","year":"2011","unstructured":"Wenger, E., Werner, M.: Evaluating 16-bit processors for elliptic curve cryptography. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 166\u2013181. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Radio Frequency Identification: Security and Privacy Issues"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-13066-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T18:31:39Z","timestamp":1747161099000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-13066-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319130651","9783319130668"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-13066-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"15 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}