{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,26]],"date-time":"2026-04-26T01:28:26Z","timestamp":1777166906811,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":36,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642272561","type":"print"},{"value":"9783642272578","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27257-8_11","type":"book-chapter","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T00:50:42Z","timestamp":1323651042000},"page":"166-181","source":"Crossref","is-referenced-by-count":28,"title":["Evaluating 16-Bit Processors for Elliptic Curve Cryptography"],"prefix":"10.1007","author":[{"given":"Erich","family":"Wenger","sequence":"first","affiliation":[]},{"given":"Mario","family":"Werner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"American National Standards Institute (ANSI). AMERICAN NATIONAL STANDARD X9.62-2005. Public Key Cryptography for the Financial Services Industry, The Elliptic Curve Digital Signature Algorithm, ECDSA (2005)"},{"key":"11_CR2","unstructured":"Atmel Corporation. 8-bit AVR Microcontroller with 128K Bytes In-System Programmable Flash (August 2007), \n                    \n                      http:\/\/www.atmel.com\/dyn\/resources\/prod_documents\/doc2467.pdf"},{"key":"11_CR3","unstructured":"Bernstein, D., Lange, T.: Explicit-formulas database, \n                    \n                      http:\/\/www.hyperelliptic.org\/EFD"},{"key":"11_CR4","unstructured":"Certicom Research. Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 1.0 (September 2000), \n                    \n                      http:\/\/www.secg.org\/"},{"key":"11_CR5","unstructured":"Certicom Research. Standards for Efficient Cryptography, SEC 2: Recommended Elliptic Curve Domain Parameters, Version 2.0 (January 2010), \n                    \n                      http:\/\/www.secg.org\/"},{"issue":"4","key":"11_CR6","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1147\/sj.294.0526","volume":"29","author":"P. Comba","year":"1990","unstructured":"Comba, P.: Exponentiation cryptosystems on the IBM PC. IBM Systems Journal\u00a029(4), 526\u2013538 (1990)","journal-title":"IBM Systems Journal"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/3-540-48059-5_25","volume-title":"Cryptographic Hardware and Embedded Systems","author":"J.-S. Coron","year":"1999","unstructured":"Coron, J.-S.: Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. In: Ko\u00e7, \u00c7.K., Paar, C. (eds.) CHES 1999. LNCS, vol.\u00a01717, pp. 292\u2013302. Springer, Heidelberg (1999)"},{"key":"11_CR8","unstructured":"Crossbow Technology, Inc. MICAz Wireless Measurement System, \n                    \n                      http:\/\/www.xbow.com\/Products\/Product_pdf_files\/Wireless_pdf\/MICAz_Datasheet.pdf"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Ebeid, N., Lambert, R.: Securing the Elliptic Curve Montgomery Ladder Against Fault Attacks. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2009, Lausanne, Switzerland, pp. 46\u201350 (September 2009)","DOI":"10.1109\/FDTC.2009.35"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Fan, J., Guo, X., Mulder, E.D., Schaumont, P., Preneel, B., Verbauwhede, I.: State-of-the-Art of Secure ECC Implementations: A Survey on known Side-Channel Attacks and Countermeasures. In: Proceedings of 3rd IEEE International Symposium Hardware-Oriented Security and Trust - HOST 2010, California, USA, June 13-14, pp. 76\u201387. IEEE (2010)","DOI":"10.1109\/HST.2010.5513110"},{"key":"11_CR11","unstructured":"Gro\u00dfmann, M.: Optimize Elliptic Curve Cryptography for MSP430 Processor. Bachelor Thesis at Graz University of Technology (May 2011)"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-540-28632-5_10","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"J. Gro\u00dfsch\u00e4dl","year":"2004","unstructured":"Gro\u00dfsch\u00e4dl, J., Sava\u015f, E.: Instruction Set Extensions for Fast Arithmetic in Finite Fields GF(p) and GF(2\n                    m\n                  ). In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 133\u2013147. Springer, Heidelberg (2004)"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N. Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"11_CR14","volume-title":"Guide to Elliptic Curve Cryptography","author":"D. Hankerson","year":"2004","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"11_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-16822-2_16","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"M. Hutter","year":"2010","unstructured":"Hutter, M., Feldhofer, M., Plos, T.: An ECDSA Processor for RFID Authentication. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 189\u2013202. Springer, Heidelberg (2010)"},{"key":"11_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-21969-6_11","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"M. Hutter","year":"2011","unstructured":"Hutter, M., Joye, M., Sierra, Y.: Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol.\u00a06737, pp. 170\u2013187. Springer, Heidelberg (2011)"},{"key":"11_CR17","unstructured":"IAR Systems. IAR Embedded Workbench (2011), \n                    \n                      http:\/\/www.iar.com\/"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Kern, T., Feldhofer, M.: Low-Resource ECDSA Implementation for Passive RFID Tags. In: Proceedings of 17th IEEE International Conference on Electronics, Circuits and Systems (ICECS 2010), Athens, Greece, December 12-15, pp. 1236\u20131239. IEEE (2010)","DOI":"10.1109\/ICECS.2010.5724742"},{"issue":"3","key":"11_CR19","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/40.502403","volume":"16","author":"\u00c7.K.. Ko\u00e7","year":"1996","unstructured":"Ko\u00e7, \u00c7.K., Acar, T., Kaliski Jr., B.S.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro\u00a016(3), 26\u201333 (1996)","journal-title":"IEEE Micro"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. In: Proceedings of International Conference on Information Processing in Sensor Networks - IPSN 2008, St. Louis, Missouri, USA, April 22-24, pp. 245\u2013256 (2008)","DOI":"10.1109\/IPSN.2008.47"},{"key":"11_CR21","unstructured":"Liu, Z., Gro\u00dfsch\u00e4dl, J., Kizhvatov, I.: Efficient and Side-Channel Resistant RSA Implementation for 8-bit AVR Microcontrollers. In: Proceedings of 1st International Workshop on the Security of the Internet of Things - SOCIOT 2010, Tokyo, Japan, November 29. IEEE Computer Society (2010)"},{"key":"11_CR22","unstructured":"Microchip. PIC24FJ128GA010 Family Data Sheet. DS39747E (October 2009), \n                    \n                      http:\/\/www.microchip.com"},{"key":"11_CR23","unstructured":"Microchip. dsPIC30F6010A\/6015 Data Sheet. DS70150E (March 2011), \n                    \n                      http:\/\/www.microchip.com"},{"key":"11_CR24","unstructured":"Microchip. MPLAB Integrated Development Environment (2011), \n                    \n                      http:\/\/www.microchip.com"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1090\/S0025-5718-1985-0777282-X","volume":"44","author":"P.L. Montgomery","year":"1985","unstructured":"Montgomery, P.L.: Modular Multiplication without Trial Division. Mathematics of Computation\u00a044, 519\u2013521 (1985)","journal-title":"Mathematics of Computation"},{"key":"11_CR26","unstructured":"Moteiv. The Moteiv Wireless Sensor Networks Website, \n                    \n                      http:\/\/www.moteiv.com\/"},{"key":"11_CR27","unstructured":"National Institute of Standards and Technology (NIST). FIPS-186-3: Digital Signature Standard, DSS (2009), \n                    \n                      http:\/\/www.itl.nist.gov\/fipspubs\/"},{"key":"11_CR28","unstructured":"National Institute of Standards and Technology (NIST). SP800-57 Part 1: DRAFT Recommendation for Key Management: Part 1: General (May 2011), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/drafts\/800-57\/Draft_SP800-57-Part1-Rev3_May2011.pdf"},{"key":"11_CR29","unstructured":"Scott, M., Szczechowiak, P.: Optimizing Multiprecision Multiplication for Public Key Cryptography. Cryptology ePrint Archive, Report 2007\/299 (2007), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"11_CR30","unstructured":"Shamus Software. Multiprecision Integer and Rational Arithmetic C\/C++ Library (2011), \n                    \n                      http:\/\/www.shamus.ie\/"},{"key":"11_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-77690-1_19","volume-title":"Wireless Sensor Networks","author":"P. Szczechowiak","year":"2008","unstructured":"Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 305\u2013320. Springer, Heidelberg (2008)"},{"key":"11_CR32","unstructured":"Texas Instruments. MSP430C11x1 - Mixed Signal Microcontroller (2008), \n                    \n                      http:\/\/focus.ti.com"},{"key":"11_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-540-73275-4_6","volume-title":"Security and Privacy in Ad-hoc and Sensor Networks","author":"L. Uhsadel","year":"2007","unstructured":"Uhsadel, L., Poschmann, A., Paar, C.: Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. In: Stajano, F., Meadows, C., Capkun, S., Moore, T. (eds.) ESAS 2007. LNCS, vol.\u00a04572, pp. 73\u201386. Springer, Heidelberg (2007)"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-540-28632-5_14","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"C.D. Walter","year":"2004","unstructured":"Walter, C.D.: Simple Power Analysis of Unified Code for ECC Double and Add. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol.\u00a03156, pp. 191\u2013204. Springer, Heidelberg (2004)"},{"key":"11_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-17955-6_7","volume-title":"Information Security Applications","author":"E. Wenger","year":"2011","unstructured":"Wenger, E., Feldhofer, M., Felber, N.: Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol.\u00a06513, pp. 92\u2013106. Springer, Heidelberg (2011)"},{"key":"11_CR36","unstructured":"Yan, H., Shi, Z.J., Fei, Y.: Efficient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks. In: 7th Workshop on Optimizations for DSP and Embedded Systems (ODES- 7), pp. 7\u201315 (March 2009)"}],"container-title":["Lecture Notes in Computer Science","Smart Card Research and Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27257-8_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:59:16Z","timestamp":1606186756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27257-8_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272561","9783642272578"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27257-8_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}