{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:35:32Z","timestamp":1757543732460},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2015,5,31]],"date-time":"2015-05-31T00:00:00Z","timestamp":1433030400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s10623-015-0087-1","type":"journal-article","created":{"date-parts":[[2015,5,30]],"date-time":"2015-05-30T07:53:09Z","timestamp":1432972389000},"page":"493-514","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":86,"title":["High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers"],"prefix":"10.1007","volume":"77","author":[{"given":"Michael","family":"D\u00fcll","sequence":"first","affiliation":[]},{"given":"Bj\u00f6rn","family":"Haase","sequence":"additional","affiliation":[]},{"given":"Gesine","family":"Hinterw\u00e4lder","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Hutter","sequence":"additional","affiliation":[]},{"given":"Christof","family":"Paar","sequence":"additional","affiliation":[]},{"given":"Ana Helena","family":"S\u00e1nchez","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schwabe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,31]]},"reference":[{"key":"87_CR1","unstructured":"Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information. Avis relatif aux param\u00e8tres de courbes elliptiques d\u00e9finis par l\u2019Etat fran\u00e7ais. Journal officiel de la R\u00e9publique Fran\u00e7aise, 0241, 17533 (2011). http:\/\/www.legifrance.gouv.fr\/affichTexte.do?cidTexte=JORFTEXT000024668816 ."},{"key":"87_CR2","doi-asserted-by":"crossref","unstructured":"Aranha D.F., Dahab R., L\u00f3pez J., Oliveira L.B.: Efficient implementation of elliptic curve cryptography in wireless sensors. Adv. Math. Commun. 4(2), 169\u2013187 (2010).","DOI":"10.3934\/amc.2010.4.169"},{"key":"87_CR3","unstructured":"Atmel Corporation: AVR1519: XMEGA-A1 Xplained Training\u2014XMEGA Crypto Engines. 8-bit Atmel Microcontrollers Application Note (2011). http:\/\/www.atmel.com\/Images\/doc8405.pdf ."},{"key":"87_CR4","doi-asserted-by":"crossref","unstructured":"Batina L., Chmielewski, \u0141., Papachristodoulou L., Schwabe P., Tunstall M.: Online template attacks. In: Meier W., Mukhopadhyay D. (eds.) Progress in Cryptology\u2014INDOCRYPT 2014. Lecture Notes in Computer Science, vol. 21\u201336, p. 8885. Springer, Berlin (2014). http:\/\/cryptojedi.org\/papers\/#ota .","DOI":"10.1007\/978-3-319-13039-2_2"},{"key":"87_CR5","doi-asserted-by":"crossref","unstructured":"Bernstein D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung M., Dodis Y., Kiayias A., Malkin T. (eds.) Public Key Cryptography\u2014PKC 2006. Lecture Notes in Computer Science, vol. 3958, pp. 207\u2013228. Springer, Berlin (2006). http:\/\/cr.yp.to\/papers.html#curve25519 .","DOI":"10.1007\/11745853_14"},{"key":"87_CR6","unstructured":"Bernstein D.J.: 25519 naming. Posting to the CFRG mailing list (2014). https:\/\/www.ietf.org\/mail-archive\/web\/cfrg\/current\/msg04996.html ."},{"key":"87_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Schwabe, P.: NEON crypto. In: Prouff E., Schaumont P. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2012. Lecture Notes in Computer Science, vol. 7428, pp. 320\u2013339. Springer, Berlin (2012). http:\/\/cryptojedi.org\/papers\/#neoncrypto .","DOI":"10.1007\/978-3-642-33027-8_19"},{"key":"87_CR8","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Duif N., Lange T., Schwabe P., Yang B.-Y.: High-speed high-security signatures. In: Preneel B., Takagi T (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2011. Lecture Notes in Computer Science, vol. 6917, pp. 124\u2013142. Springer, Berlin (2011). see also full version [9].","DOI":"10.1007\/978-3-642-23951-9_9"},{"key":"87_CR9","doi-asserted-by":"crossref","unstructured":"Bernstein D.J., Duif N., Lange T., Schwabe P., Yang B.-Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2(2), 77\u201389 (2012). http:\/\/cryptojedi.org\/papers\/#ed25519 , see also short version [8].","DOI":"10.1007\/s13389-012-0027-1"},{"key":"87_CR10","unstructured":"Bernstein D.J., Chou T., Chuengsatiansup C., H\u00fclsing A., Lange T., Niederhagen R., van Vredendaal C.: How to manipulate curve standards: a white paper for the black hat. Cryptology ePrint Archive, Report 2014\/571 (2014). http:\/\/eprint.iacr.org\/2014\/571 , see also http:\/\/safecurves.cr.yp.to\/bada55.html ."},{"key":"87_CR11","unstructured":"Bernstein D.J., Chuengsatiansup C., Lange T., Schwabe P.: Kummer strikes back: new DH speed records. In: Iwata T., Sarkar P (eds.) Advances in Cryptology\u2014ASIACRYPT 2014. Lecture Notes in Computer Science, vol. 8873, pp. 317\u2013337. Springer, Berlin (2014). Full version: http:\/\/cryptojedi.org\/papers\/#kummer ."},{"key":"87_CR12","doi-asserted-by":"crossref","unstructured":"Clavier C., Feix B., Gagnerot G., Roussellet M., Verneuil V.: Horizontal correlation analysis on exponentiation. In: Soriano M., Qing S., L\u00f3pez J. (eds.) Information and Communications Security. Lecture Notes in Computer Science, vol. 6476, pp. 46\u201361. Springer, Berlin (2010). http:\/\/eprint.iacr.org\/2003\/237 .","DOI":"10.1007\/978-3-642-17650-0_5"},{"key":"87_CR13","doi-asserted-by":"crossref","unstructured":"Costigan N., Schwabe P.: Fast elliptic-curve cryptography on the Cell Broadband Engine. In: Preneel B (ed.) Progress in Cryptology\u2014AFRICACRYPT 2009. Lecture Notes in Computer Science, vol. 5580, pp. 368\u2013385. Springer, Berlin (2009). http:\/\/cryptojedi.org\/papers\/#celldh .","DOI":"10.1007\/978-3-642-02384-2_23"},{"key":"87_CR14","unstructured":"Dalin D., Gro\u00dfsch\u00e4dl J., Liu Z., M\u00fcller V., Zhang W.: Twisted edwards-form elliptic curve cryptography for 8-bit AVR-based sensor nodes. In: Xu S., Zhao Y. (eds.) Proceeding of the 1st ACM Workshop on Asia Public-key Cryptography\u2014AsiaPKC 2013, pp. 39\u201344. ACM, New York (2013). http:\/\/orbilu.uni.lu\/handle\/10993\/14765 ."},{"key":"87_CR15","doi-asserted-by":"crossref","unstructured":"De Clercq R., Uhsadel L., Van Herrewege A., Verbauwhede I.: Ultra low-power implementation of ECC on the ARM Cortex-M0+. In: DAC \u201914 Proceedings of the The 51st Annual Design Automation Conference on Design Automation Conference, pp. 1\u20136. ACM, New York (2014). https:\/\/www.cosic.esat.kuleuven.be\/publications\/article-2401.pdf .","DOI":"10.1145\/2593069.2593238"},{"key":"87_CR16","unstructured":"Gouv\u00eaa C.P.L.: Personal communication (2014)."},{"key":"87_CR17","doi-asserted-by":"crossref","unstructured":"Gouv\u00eaa C.P.L., L\u00f3pez J.: Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In: Sendrier N., Roy B. (eds.) Progress in Cryptology\u2014INDOCRYPT 2009. Lecture Notes in Computer Science, vol. 5922, pp. 248\u2013262. Springer, Berlin (2009). http:\/\/conradoplg.cryptoland.net\/files\/2010\/12\/indocrypt09.pdf .","DOI":"10.1007\/978-3-642-10628-6_17"},{"key":"87_CR18","doi-asserted-by":"crossref","unstructured":"Gouv\u00eaa C.P.L., Oliveira L.B., L\u00f3pez J.: Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. J. Cryptogr. Eng. 2(1) (2012). http:\/\/conradoplg.cryptoland.net\/files\/2010\/12\/jcen12.pdf .","DOI":"10.1007\/s13389-012-0029-z"},{"key":"87_CR19","doi-asserted-by":"crossref","unstructured":"Guajardo J., Bl\u00fcmel R., Krieger U., Paar C.: Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers. In: Kim K (ed.) Public Key Cryptography\u2014PKC 2001. Lecture Notes in Computer Science, vol. 1992, pp. 365\u2013382. Springer, Berlin (2001). http:\/\/www.emsec.rub.de\/media\/crypto\/veroeffentlichungen\/2011\/01\/21\/guajardopkc2001_msp430.pdf .","DOI":"10.1007\/3-540-44586-2_27"},{"key":"87_CR20","doi-asserted-by":"crossref","unstructured":"Gura N., Patel A., Wander A., Eberle H., Shantz S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye M (ed.) Cryptographic Hardware and Embedded Systems\u2014CHES 2004. Lecture Notes in Computer Science, vol. 3156, pp. 119\u2013132. Springer, Berlin (2004). www.iacr.org\/archive\/ches2004\/31560117\/31560117.pdf .","DOI":"10.1007\/978-3-540-28632-5_9"},{"key":"87_CR21","unstructured":"Hinterw\u00e4lder G., Moradi A., Hutter M., Schwabe P., Paar C.: Full-size high-security ECC implementation on MSP430 microcontrollers. In: Third International Conference on Cryptology and Information Security in Latin America\u2014Latincrypt 2014. Lecture Notes in Computer Science. Springer, Berlin (2014). http:\/\/www.emsec.rub.de\/research\/publications\/Curve25519MSPLatin2014\/ ."},{"key":"87_CR22","doi-asserted-by":"crossref","unstructured":"Hutter M., Wenger E.: Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Preneel, B., Takagi T. (eds.) Cryptographic Hardware and Embedded Systems\u2014CHES 2011. Lecture Notes in Computer Science, vol. 6917, pp. 459\u2013474. Springer, Berlin (2011). http:\/\/mhutter.org\/papers\/Hutter2011FastMultiPrecision.pdf .","DOI":"10.1007\/978-3-642-23951-9_30"},{"key":"87_CR23","doi-asserted-by":"crossref","unstructured":"Hutter M., Schwabe P.: NaCl on 8-bit AVR microcontrollers. In: Youssef A., Nitaj A. (eds.) Progress in Cryptology\u2014AFRICACRYPT 2013. Lecture Notes in Computer Science, vol. 7918, pp. 156\u2013172. Springer, Berlin (2013). http:\/\/cryptojedi.org\/papers\/#avrnacl .","DOI":"10.1007\/978-3-642-38553-7_9"},{"key":"87_CR24","unstructured":"Hutter M., Schwabe P.: Multiprecision multiplication on AVR revisited (2014). http:\/\/cryptojedi.org\/papers\/#avrmul ."},{"key":"87_CR25","unstructured":"Kenny P.: Formal request from TLS WG to CFRG for new elliptic curves. Posting to the CFRG mailing list (2014). http:\/\/www.ietf.org\/mail-archive\/web\/cfrg\/current\/msg04655.html ."},{"key":"87_CR26","doi-asserted-by":"crossref","unstructured":"Koblitz N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987). http:\/\/www.ams.org\/journals\/mcom\/1987-48-177\/S0025-5718-1987-0866109-5\/S0025-5718-1987-0866109-5.pdf .","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"87_CR27","unstructured":"Liu A., Ning P.: TinyECC: a configurable library for elliptic curve cryptography in wireless sensor networks. In: International Conference on Information Processing in Sensor Networks\u2014IPSN 2008(April), pp. 22\u201324, 2008. St. Louis, Missouri, USA, Proceedings, pp. 245\u2013256 (2008). http:\/\/discovery.csc.ncsu.edu\/pubs\/ipsn08-TinyECC-IEEE.pdf ."},{"key":"87_CR28","doi-asserted-by":"crossref","unstructured":"Liu Z., Seo H., Gro\u00dfsch\u00e4dl J., Kim H.: Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes. In: Qing S., Zhou J., Liu D. (eds.) Information and Communications Security. Lecture Notes in Computer Science, vol. 8233, pp. 302\u2013317. Springer, Berlin (2013). http:\/\/orbilu.uni.lu\/bitstream\/10993\/12934\/1\/ICICS2013.pdf .","DOI":"10.1007\/978-3-319-02726-5_22"},{"key":"87_CR29","doi-asserted-by":"crossref","unstructured":"Liu Z., Gro\u00dfsch\u00e4dl J., Wenger E.: MoTE-ECC: energy-scalable elliptic curve cryptography for wireless sensor networks. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 8479, pp. 361\u2013379. Springer, Berlin (2014). https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=77985 .","DOI":"10.1007\/978-3-319-07536-5_22"},{"key":"87_CR30","unstructured":"Lochter M., Merkle J.: Elliptic curve cryptography (ECC) Brainpool standard curves and curve generation. IETF Request for Comments 5639 (2010). http:\/\/tools.ietf.org\/html\/rfc5639 ."},{"key":"87_CR31","doi-asserted-by":"crossref","unstructured":"Miller V.S.: Use of elliptic curves in cryptography. In: Williams H.C. (ed.) Advances in Cryptology\u2014CRYPTO \u201985: Proceedings. Lecture Notes in Computer Science, vol. 218, pp. 417\u2013426. Springer, Berlin (1986).","DOI":"10.1007\/3-540-39799-X_31"},{"key":"87_CR32","doi-asserted-by":"crossref","unstructured":"Montgomery P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987). http:\/\/www.ams.org\/journals\/mcom\/1987-48-177\/S0025-5718-1987-0866113-7\/S0025-5718-1987-0866113-7.pdf .","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"87_CR33","unstructured":"National Institute of Standards and Technology. FIPS PUB 186\u20134 digital signature standard (DSS) (2013). http:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf ."},{"key":"87_CR34","unstructured":"NXP. LPC1110\/11\/12\/13\/14\/15 32-bit ARM Cortex-M0 microcontroller; up to 64 kB flash and 8 kB SRAM. Product data sheet, rev. 9.2 edition (2014). http:\/\/www.nxp.com\/documents\/data_sheet\/LPC111X.pdf ."},{"key":"87_CR35","unstructured":"Pendl C., Pelnar M., Hutter M.: Elliptic curve cryptography on the WISP UHF RFID tag. In: Juels A., Paar C. (eds.) 8th Workshop on RFID Security and Privacy\u2014RFIDsec 2012. Lecture Notes in Computer Science, vol. 7055, pp. 32\u201347. Springer, Berlin (2012). http:\/\/mhutter.org\/papers\/Pendl2011EllipticCurveCryptography.pdf ."},{"key":"87_CR36","unstructured":"ProcFig0. Public key cryptographic algorithm SM2 based on elliptic curves. Part 1: General. (2012). http:\/\/www.oscca.gov.cn\/UpFile\/2010122214822692.pdf ."},{"key":"87_CR37","unstructured":"Scott M.: Re: NIST announces set of elliptic curves. Posting to the sci.crypt mailing list (1999). https:\/\/groups.google.com\/forum\/message\/raw?msg=sci.crypt\/mFMukSsORmI\/FpbHDQ6hM_MJ ."},{"key":"87_CR38","doi-asserted-by":"crossref","unstructured":"Seo H., Kim H.: Multi-precision multiplication for public-key cryptography on embedded microprocessors. In: Lee D.H., Yung M (eds.) Information Security Applications. Lecture Notes in Computer Science, vol. 7690, pp. 55\u201367. Springer, Berlin (2012). doi: 10.1007\/978-3-642-35416-8","DOI":"10.1007\/978-3-642-35416-8"},{"key":"87_CR39","unstructured":"Seo H., Kim H.: Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors. Int. J. Comput. Commun. Eng. 2(3), (2013). http:\/\/www.ijcce.org\/papers\/183-J034.pdf ."},{"key":"87_CR40","doi-asserted-by":"crossref","unstructured":"Szczechowiak P., Oliveira L.B., Scott M., Collier M., Dahab R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone R. (ed.) Wireless Sensor Networks. Lecture Notes in Computer Science, vol. 4913, pp. 305\u2013320. Springer, Berlin (2008). http:\/\/www.ic.unicamp.br\/~leob\/publications\/ewsn\/NanoECC.pdf .","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"87_CR41","unstructured":"Texas Instruments Incorporated. MSP430FR58xx, MSP430FR59xx, MSP430FR68xx, and MSP430FR69xx family user\u2019s guide (2012). www.ti.com.cn\/cn\/lit\/ug\/slau367f\/slau367f.pdf ."},{"key":"87_CR42","unstructured":"Texas Instruments Incorporated. MSP430x2xx family user\u2019s guide (2004). http:\/\/www.ti.com\/lit\/ug\/slau144j\/slau144j.pdf ."},{"key":"87_CR43","unstructured":"Texas Instruments Incorporated. MSP-EXP430FR5969 LaunchPad Development Kit user\u2019s guide (2014). http:\/\/www.ti.com\/lit\/ug\/slau535a\/slau535a.pdf ."},{"key":"87_CR44","doi-asserted-by":"crossref","unstructured":"Wenger E., Werner M.: Evaluating 16-bit processors for elliptic curve cryptography. In: Prouff E. (ed.) Smart Card Research and Advanced Applications\u2014CARDIS 2011. Lecture Notes in Computer Science, vol. 7079, pp. 166\u2013181. Springer, Berlin (2011). https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=59062 .","DOI":"10.1007\/978-3-642-27257-8_11"},{"key":"87_CR45","doi-asserted-by":"crossref","unstructured":"Wenger E., Unterluggauer T., Werner M.: 8\/16\/32 shades of elliptic curve cryptography on embedded processors. In: Paul G., Vaudenay S. (eds.) Progress in Cryptology\u2014INDOCRYPT 2013. Lecture Notes in Computer Science, vol. 8250, pp. 244\u2013261. Springer, Berlin (2013). https:\/\/online.tugraz.at\/tug_online\/voe_main2.getvolltext?pCurrPk=72486 .","DOI":"10.1007\/978-3-319-03515-4_16"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0087-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10623-015-0087-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-015-0087-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T22:53:11Z","timestamp":1553640791000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10623-015-0087-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,31]]},"references-count":45,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["87"],"URL":"https:\/\/doi.org\/10.1007\/s10623-015-0087-1","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,31]]}}}