{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:40:02Z","timestamp":1745944802569,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642356674"},{"type":"electronic","value":"9783642356681"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-35668-1_21","type":"book-chapter","created":{"date-parts":[[2013,1,4]],"date-time":"2013-01-04T10:07:03Z","timestamp":1357294023000},"page":"300-314","source":"Crossref","is-referenced-by-count":5,"title":["Parallel Scalar Multiplication on Elliptic Curves in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yanbo","family":"Shou","sequence":"first","affiliation":[]},{"given":"Herve","family":"Guyennet","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Lehsaini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"21_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I. Akyildiz","year":"2002","unstructured":"Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks\u00a038(4), 393\u2013422 (2002)","journal-title":"Computer Networks"},{"issue":"2","key":"21_CR2","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MIC.2006.26","volume":"10","author":"G. Werner-Allen","year":"2006","unstructured":"Werner-Allen, G., Lorincz, K., Ruiz, M., Marcillo, O., Johnson, J., Lees, J., Welsh, M.: Deploying a wireless sensor network on an active volcano. IEEE Internet Computing\u00a010(2), 18\u201325 (2006)","journal-title":"IEEE Internet Computing"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Kim, S., Pakzad, S., Culler, D., Demmel, J., Fenves, G., Glaser, S., Turon, M.: Wireless sensor networks for structural health monitoring. In: Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, pp. 427\u2013428. ACM (2006)","DOI":"10.1145\/1182807.1182889"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Baker, C., Armijo, K., Belka, S., Benhabib, M., Bhargava, V., Burkhart, N., Der Minassians, A., Dervisoglu, G., Gutnik, L., Haick, M., et al.: Wireless sensor networks for home health care. In: 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007, vol.\u00a02, pp. 832\u2013837. IEEE (2007)","DOI":"10.1109\/AINAW.2007.376"},{"key":"21_CR5","unstructured":"Welsh, M., Moulton, S., Fulford-Jones, T., Malan, D.: Codeblue: An ad hoc sensor network infrastructure for emergency medical care. In: International Workshop on Wearable and Implantable Body Sensor Networks, London, UK (April 2004)"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Gosnell, T., Hall, J., Jam, C., Knapp, D., Koenig, Z., Luke, S., Pohl, B., Schach von Wittenau, A., Wolford, J.: Gamma-ray identification of nuclear weapon materials. Technical report, Lawrence Livermore National Lab, Livermore, CA, US (1997)","DOI":"10.2172\/16135"},{"key":"21_CR7","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1201\/9780849379253-20","volume":"1","author":"J. Walters","year":"2007","unstructured":"Walters, J., Liang, Z., Shi, W., Chaudhary, V.: Wireless sensor network security: A survey. Security in Distributed, Grid, Mobile, and Pervasive Computing\u00a01, 367 (2007)","journal-title":"Security in Distributed, Grid, Mobile, and Pervasive Computing"},{"issue":"3","key":"21_CR8","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y. Zhou","year":"2008","unstructured":"Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials\u00a010(3), 6\u201328 (2008)","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In: Proceedings of the 6th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, Cambridge, MA, USA, August 11-13, vol.\u00a06, p. 119. Springer-Verlag New York Inc. (2004)","DOI":"10.1007\/978-3-540-28632-5_9"},{"issue":"1","key":"21_CR10","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1006\/jagm.1997.0913","volume":"27","author":"D. Gordon","year":"1998","unstructured":"Gordon, D.: A survey of fast exponentiation methods. Journal of Algorithms\u00a027(1), 129\u2013146 (1998)","journal-title":"Journal of Algorithms"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology","author":"V.S. Miller","year":"1986","unstructured":"Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 417\u2013426. Springer, Heidelberg (1986)"},{"issue":"177","key":"21_CR12","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N. Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation\u00a048(177), 203\u2013209 (1987)","journal-title":"Mathematics of Computation"},{"key":"21_CR13","unstructured":"Hankerson, D., Vanstone, S., Menezes, A.: Guide to elliptic curve cryptography. Springer-Verlag New York Inc. (2004)"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/3-540-45353-9_19","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"M. Brown","year":"2001","unstructured":"Brown, M., Hankerson, D., L\u00f3pez, J., Menezes, A.: Software Implementation of the NIST Elliptic Curves Over Prime Fields. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 250\u2013265. Springer, Heidelberg (2001)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Panda, B., Khilar, P.: Fpga based implementation of parallel ecc processor. In: Proceedings of the 2011 International Conference on Communication, Computing & Security, pp. 453\u2013456. ACM (2011)","DOI":"10.1145\/1947940.1948033"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Purnaprajna, M., Puttmann, C., Porrmann, M.: Power aware reconfigurable multiprocessor for elliptic curve cryptography. In: Design, Automation and Test in Europe, DATE 2008, pp. 1462\u20131467. IEEE (2008)","DOI":"10.1109\/DATE.2008.4484880"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-47555-9_18","volume-title":"Advances in Cryptology - EUROCRYPT \u201992","author":"E.F. Brickell","year":"1993","unstructured":"Brickell, E.F., Gordon, D.M., McCurley, K.S., Wilson, D.B.: Fast Exponentiation with Precomputation: Algorithms and Lower Bounds. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol.\u00a0658, pp. 200\u2013207. Springer, Heidelberg (1993)"},{"key":"21_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/BFb0028484","volume-title":"Information and Communications Security","author":"A. Miyaji","year":"1997","unstructured":"Miyaji, A., Ono, T., Cohen, H.: Efficient Elliptic Curve Exponentiation. In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol.\u00a01334, pp. 282\u2013290. Springer, Heidelberg (1997)"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Ansari, B., Wu, H.: Parallel scalar multiplication for elliptic curve cryptosystems. In: Proceedings of the 2005 International Conference on Communications, Circuits and Systems, vol.\u00a01, pp. 71\u201373. IEEE (2005)","DOI":"10.1109\/ICCCAS.2005.1493364"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/3-540-48658-5_11","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"C.H. Lim","year":"1994","unstructured":"Lim, C.H., Lee, P.J.: More Flexible Exponentiation with Precomputation. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 95\u2013107. Springer, Heidelberg (1994)"},{"key":"21_CR21","first-page":"2005","volume":"30","author":"C. Canniere De","year":"2005","unstructured":"De Canniere, C., Preneel, B.: Trivium specifications. estream, ECRYPT Stream Cipher Project, Report\u00a030 (2005)","journal-title":"estream, ECRYPT Stream Cipher Project, Report"},{"key":"21_CR22","first-page":"2006","volume":"39","author":"H. Raddum","year":"2006","unstructured":"Raddum, H.: Cryptanalytic results on trivium. estream, ECRYPT Stream Cipher Project, Report\u00a039 (2006)","journal-title":"estream, ECRYPT Stream Cipher Project, Report"},{"key":"21_CR23","unstructured":"MEMSIC: Telosb mote platform datasheet (November 2011), http:\/\/www.memsic.com\/products\/wireless-sensor-networks\/wireless-modules.html"},{"key":"21_CR24","unstructured":"MEMSIC: Mica2\/micaz mote platform datasheet (June 2011), http:\/\/www.memsic.com\/products\/wireless-sensor-networks\/wireless-modules.html"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Titzer, B., Lee, D., Palsberg, J.: Avrora: Scalable sensor network simulation with precise timing. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, pp. 477\u2013482. IEEE (2005)","DOI":"10.1109\/IPSN.2005.1440978"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Chen, H., Wu, H., Zhou, X., Gao, C.: Reputation-based trust in wireless sensor networks. In: International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, pp. 603\u2013607. IEEE (2007)","DOI":"10.1109\/MUE.2007.181"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-35668-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T16:00:14Z","timestamp":1745942414000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-35668-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642356674","9783642356681"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-35668-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}