{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:53:41Z","timestamp":1773248021354,"version":"3.50.1"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/giots.2018.8534575","type":"proceedings-article","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T21:38:00Z","timestamp":1542317880000},"page":"1-6","source":"Crossref","is-referenced-by-count":75,"title":["A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices"],"prefix":"10.1109","author":[{"given":"Manuel","family":"Suarez-Albela","sequence":"first","affiliation":[]},{"given":"Tiago M.","family":"Fernandez-Carames","sequence":"additional","affiliation":[]},{"given":"Paula","family":"Fraga-Lamas","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Castedo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","year":"0"},{"key":"ref32","year":"0","journal-title":"ESP32 Overview &#x2014; Espressif Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICMEE.2010.5558401"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2014.6894012"},{"key":"ref37","year":"0","journal-title":"ESP32 Datasheet Version 2 1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-57p1r3"},{"key":"ref35","year":"0","journal-title":"Espressif IoT Development Framework Official development framework for ESP32"},{"key":"ref34","year":"0"},{"key":"ref10","year":"0","journal-title":"Datagram Transport Layer Security Version 1 2"},{"key":"ref11","year":"0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384464"},{"key":"ref13","article-title":"Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations","author":"polk","year":"2005","journal-title":"NIST Special Publication 800-41 Revision 1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ZINC.2016.7513647"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2515516"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SIOT.2015.9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/EMTC.2014.6996632"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MobServ.2014.24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2013.145"},{"key":"ref28","first-page":"119","author":"gura","year":"2004","journal-title":"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"643","DOI":"10.3390\/s17030643","article-title":"An Electricity Price-Aware Open-Source Smart Socket for the Internet of Energy","volume":"17","author":"blanco-novoa","year":"2017","journal-title":"SENSORS"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246121"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/s16101644"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2017.7945583"},{"key":"ref29","author":"maletsky","year":"2015","journal-title":"RSA vs ECC Comparison for Embedded Systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"28","DOI":"10.3390\/s17010028","article-title":"Reverse engineering and security evaluation of commercial tags for RFID-Based IoT applications","volume":"17","author":"fern\u00e1ndez-caram\u00e9s","year":"2016","journal-title":"SENSORS"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"465","DOI":"10.3390\/s17030465","article-title":"VineSens: An Eco-Smart Decision-Support Viticulture System","volume":"17","author":"p\u00e9rez-exp\u00f3sito","year":"2017","journal-title":"SENSORS"},{"key":"ref7","first-page":"1","article-title":"A comprehensive study of security of Internetof-Things","author":"nia","year":"2016","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/s16101595"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.3390\/s17091978","article-title":"A Practical Evaluation of a High-Security Energy-Efficient Gateway for IoT Fog Computing Applications","volume":"17","author":"su\u00e1rez-albela","year":"2017","journal-title":"SENSORS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3390\/s16122186"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733648"},{"key":"ref22","year":"0","journal-title":"Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSNIP.2015.7106963"},{"key":"ref24","year":"0","journal-title":"The Transport Layer Security (TLS) Protocol Version 1 2"},{"key":"ref23","first-page":"65","author":"r\u00fcuhrmair","year":"2012","journal-title":"Security Based on Physical Unclonability and Disorder"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCAS.2006.285150"},{"key":"ref25","first-page":"121","article-title":"Universal security from&#x00B4; bits and mips to pools, lakes-and beyond","volume":"8260","author":"lenstra","year":"2013","journal-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"}],"event":{"name":"2018 Global Internet of Things Summit (GIoTS)","location":"Bilbao","start":{"date-parts":[[2018,6,4]]},"end":{"date-parts":[[2018,6,7]]}},"container-title":["2018 Global Internet of Things Summit (GIoTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8514818\/8534428\/08534575.pdf?arnumber=8534575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:41:17Z","timestamp":1643211677000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8534575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/giots.2018.8534575","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}