{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:45:36Z","timestamp":1725536736064},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642039430"},{"type":"electronic","value":"9783642039447"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03944-7_9","type":"book-chapter","created":{"date-parts":[[2009,8,27]],"date-time":"2009-08-27T07:00:04Z","timestamp":1251356404000},"page":"112-127","source":"Crossref","is-referenced-by-count":27,"title":["Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Christian","family":"Lederer","sequence":"first","affiliation":[]},{"given":"Roland","family":"Mader","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"Koschuch","sequence":"additional","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Szekely","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Tillich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Atmel Corporation. 8-bit ARV\u00ae Instruction Set. User Guide (July 2008), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc0856.pdf"},{"key":"9_CR2","unstructured":"Atmel Corporation. 8-bit ARV\u00ae Microcontroller with 128K Bytes In-System Programmable Flash: ATmega128, ATmega128L. Datasheet (June 2008), http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/11734666_9","volume-title":"Security in Pervasive Computing","author":"A. Becher","year":"2006","unstructured":"Becher, A., Benenson, Z., Dornseif, M.: Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol.\u00a03934, pp. 104\u2013118. Springer, Heidelberg (2006)"},{"key":"9_CR4","unstructured":"Bla\u00df, E.-O., Zitterbart, M.: Efficient implementation of elliptic curve cryptography for wireless sensor networks. Technical Report TM-2005-1, Institute of Telematics, University of Karlsruhe, Karlsruhe, Germany (March 2005), http:\/\/doc.tm.uka.de\/2005\/tm-2005-1.pdf"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-48071-4_33","volume-title":"Advances in Cryptology - CRYPTO \u201992","author":"C. Blundo","year":"1993","unstructured":"Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.\u00a0740, pp. 471\u2013486. Springer, Heidelberg (1993)"},{"issue":"1","key":"9_CR6","first-page":"33","volume":"106","author":"H. Brody","year":"2003","unstructured":"Brody, H.: 10 emerging technologies that will change the world. Technology Review\u00a0106(1), 33\u201349 (2003)","journal-title":"Technology Review"},{"issue":"10","key":"9_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer\u00a036(10), 103\u2013105 (2003)","journal-title":"Computer"},{"key":"9_CR8","first-page":"524","volume-title":"Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM 2005)","author":"H. Chan","year":"2005","unstructured":"Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of the 24th IEEE International Conference on Computer Communications (INFOCOM 2005), vol.\u00a01, pp. 524\u2013535. IEEE, Los Alamitos (2005)"},{"key":"9_CR9","first-page":"197","volume-title":"Proceedings of the 24th IEEE Symposium on Security and Privacy (S&P 2003)","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 24th IEEE Symposium on Security and Privacy (S&P 2003), pp. 197\u2013213. IEEE Computer Society Press, Los Alamitos (2003)"},{"issue":"6","key":"9_CR10","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1049\/ce:20060603","volume":"4","author":"J.P. Conti","year":"2007","unstructured":"Conti, J.P.: The Internet of things. IET Communications Engineer\u00a04(6), 20\u201325 (2007)","journal-title":"IET Communications Engineer"},{"key":"9_CR11","unstructured":"Crossbow Technology, Inc. MICAz Wireless Measurement System. Data sheet (January 2006), http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf"},{"key":"9_CR12","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/0-306-48642-3_18","volume-title":"Wireless Communications Systems and Networks, ch.\u00a018","author":"S.K. Das","year":"2004","unstructured":"Das, S.K., Agah, A., Basu, K.: Security in wireless mobile and sensor networks. In: Guizani, M. (ed.) Wireless Communications Systems and Networks, ch.\u00a018, pp. 531\u2013557. Springer, Heidelberg (2004)"},{"key":"9_CR13","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1109\/WiMob.2008.16","volume-title":"Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008)","author":"G. Meulenaer de","year":"2008","unstructured":"de Meulenaer, G., Gosset, F., Standaert, F.-X., Pereira, O.: On the energy cost of communication and cryptography in wireless sensor networks. In: Proceedings of the 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB 2008), pp. 580\u2013585. IEEE Computer Society Press, Los Alamitos (2008)"},{"issue":"6","key":"9_CR14","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"9_CR15","first-page":"62","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)","author":"W. Du","year":"2003","unstructured":"Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 62\u201372. ACM Press, New York (2003)"},{"key":"9_CR16","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS\u00a02002)","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS\u00a02002), pp. 41\u201347. ACM Press, New York (2002)"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1109\/ISCAS.2007.378271","volume-title":"Proceedings of the 40th IEEE International Symposium on Circuits and Systems (ISCAS 2007)","author":"F. F\u00fcrbass","year":"2007","unstructured":"F\u00fcrbass, F., Wolkerstorfer, J.: ECC processor with low die size for RFID applications. In: Proceedings of the 40th IEEE International Symposium on Circuits and Systems (ISCAS 2007), pp. 1835\u20131838. IEEE, Los Alamitos (2007)"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/11545262_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2005","author":"J. Gro\u00dfsch\u00e4dl","year":"2005","unstructured":"Gro\u00dfsch\u00e4dl, J., Avanzi, R.M., Sava\u015f, E., Tillich, S.: Energy-Efficient Software Implementation of Long Integer Modular Arithmetic. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol.\u00a03659, pp. 75\u201390. Springer, Heidelberg (2005)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-28632-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Sava\u015f, E.: Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2 m ). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 133\u2013147. Springer, Heidelberg (2004)"},{"key":"9_CR20","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1145\/1229285.1229334","volume-title":"Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007)","author":"J. Gro\u00dfsch\u00e4dl","year":"2007","unstructured":"Gro\u00dfsch\u00e4dl, J., Szekely, A., Tillich, S.: The energy cost of cryptographic key establishment in wireless sensor networks. In: Deng, R.H., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp. 380\u2013382. ACM Press, New York (2007)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A.S., Eberle, H., Chang Shantz, S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"9_CR22","volume-title":"Guide to Elliptic Curve Cryptography","author":"D.R. Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"9_CR23","unstructured":"Kargl, A., Pyka, S., Seuschek, H.: Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008\/442 (2008), http:\/\/eprint.iacr.org"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Kohl, J.T., Neuman, B.C.: The Kerberos Network Authentication Service (Version\u00a05). Internet Engineering Task Force, Network Working Group, RFC 1510 (September 1993)","DOI":"10.17487\/rfc1510"},{"key":"9_CR25","first-page":"245","volume-title":"Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008)","author":"A. Liu","year":"2008","unstructured":"Liu, A., Ning, P.: TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks (IPSN 2008), pp. 245\u2013256. IEEE Computer Society Press, Los Alamitos (2008)"},{"key":"9_CR26","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/948109.948119","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003)","author":"D. Liu","year":"2003","unstructured":"Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 52\u201361. ACM Press, New York (2003)"},{"key":"9_CR27","series-title":"Advances in Information Security","volume-title":"Security for Wireless Sensor Networks","author":"D. Liu","year":"2006","unstructured":"Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security, vol.\u00a028. Springer, Heidelberg (2006)"},{"key":"9_CR28","series-title":"Cryptology and Information Security Series","volume-title":"Wireless Sensor Network Security","author":"J. Lopez","year":"2008","unstructured":"Lopez, J., Zhou, J.: Wireless Sensor Network Security. Cryptology and Information Security Series, vol.\u00a01. IOS Press, Amsterdam (2008)"},{"key":"9_CR29","first-page":"71","volume-title":"Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004)","author":"D.J. Malan","year":"2004","unstructured":"Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004), pp. 71\u201380. IEEE, Los Alamitos (2004)"},{"key":"9_CR30","unstructured":"National Institute of Standards and Technology (NIST). Recommended Elliptic Curves for Federal Government Use (July 1999), http:\/\/csrc.nist.gov\/encryption\/dss\/ecdsa\/NISTReCur.pdf"},{"issue":"12","key":"9_CR31","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM\u00a021(12), 993\u2013999 (1978)","journal-title":"Communications of the ACM"},{"key":"9_CR32","unstructured":"ON World, Inc. WSN for smart homes. Market Dynamics Report (February 2008)"},{"key":"9_CR33","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1145\/381677.381696","volume-title":"Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM 2001)","author":"A. Perrig","year":"2001","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM 2001), pp. 189\u2013199. ACM Press, New York (2001)"},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/1180345.1180366","volume-title":"Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006)","author":"K. Piotrowski","year":"2006","unstructured":"Piotrowski, K., Langend\u00f6rfer, P., Peter, S.: How public key cryptography influences wireless sensor node lifetime. In: Zhu, S., Liu, D. (eds.) Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), pp. 169\u2013176. ACM Press, New York (2006)"},{"key":"9_CR35","unstructured":"Scott, M., Szczechowiak, P.: Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007\/299 (2007), http:\/\/eprint.iacr.org"},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Seo, S.C., Han, D.-G., Kim, H.C., Hong, S.: TinyECCK: Efficient elliptic curve cryptography implementation over GF(2 m ) on 8-bit Micaz mote. IEICE Transactions on Information and Systems E91-D(5), 1338\u20131347 (2008)","DOI":"10.1093\/ietisy\/e91-d.5.1338"},{"key":"9_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/9780470061794","volume-title":"Wireless Sensor Networks: Signal Processing and Communications Perspectives","author":"A. Swami","year":"2007","unstructured":"Swami, A., Zhao, Q., Hong, Y.-W., Tong, L.: Wireless Sensor Networks: Signal Processing and Communications Perspectives. John Wiley and Sons Ltd., Chichester (2007)"},{"key":"9_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P. Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"9_CR39","unstructured":"Ugus, O., Westhoff, D., Laue, R., Shoufan, A., Huss, S.A.: Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In: Wolf, T., Parameswaran, S. (eds.) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS 2007), pp. 11\u201316 (2007), http:\/\/arxiv.org\/abs\/0903.3900"},{"key":"9_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73275-4_6","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Uhsadel","year":"2007","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 73\u201386. Springer, Heidelberg (2007)"},{"key":"9_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/11935308_37","volume-title":"Information and Communications Security","author":"H. Wang","year":"2006","unstructured":"Wang, H., Li, Q.: Efficient Implementation of Public Key Cryptosystems on Mote Sensors. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol.\u00a04307, pp. 519\u2013528. Springer, Heidelberg (2006)"},{"issue":"11\/12","key":"9_CR42","doi-asserted-by":"publisher","first-page":"2314","DOI":"10.1016\/j.comcom.2007.04.009","volume":"30","author":"Y. Xiao","year":"2007","unstructured":"Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. Computer Communications\u00a030(11\/12), 2314\u20132341 (2007)","journal-title":"Computer Communications"},{"key":"9_CR43","first-page":"78","volume-title":"Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG 2006)","author":"H. Yan","year":"2006","unstructured":"Yan, H., Shi, Z.J.: Studying software implementations of elliptic curve cryptography. In: Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG 2006), pp. 78\u201383. IEEE Computer Society Press, Los Alamitos (2006)"},{"key":"9_CR44","first-page":"326","volume-title":"Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003)","author":"S. Zhu","year":"2003","unstructured":"Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), pp. 326\u2013335. IEEE Computer Society Press, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03944-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T03:20:43Z","timestamp":1633836043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03944-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642039430","9783642039447"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03944-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}