{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T20:26:07Z","timestamp":1746217567159,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icccnt.2018.8493894","type":"proceedings-article","created":{"date-parts":[[2018,11,6]],"date-time":"2018-11-06T02:36:24Z","timestamp":1541471784000},"page":"1-6","source":"Crossref","is-referenced-by-count":6,"title":["Implementation of Public Key Crypto Processor with Probabilistic Encryption on FPGA for Nodes in Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"G","family":"Leelavathi","sequence":"first","affiliation":[]},{"given":"K","family":"Shaila","sequence":"additional","affiliation":[]},{"given":"K R","family":"Venugopal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.217"},{"key":"ref11","first-page":"257","article-title":"Probabilistic Encryption Based ECC Mechanism","volume":"2","author":"krishna","year":"2011","journal-title":"International Journal of Advancements in Technology"},{"key":"ref12","first-page":"2","article-title":"An Application of the Goldwasser Micali Cryptosystem to Biometric Authentication","author":"bringer","year":"2007","journal-title":"Proceedings of the 12th Australasian Conference on Information Security and Privacy"},{"key":"ref13","first-page":"6988","article-title":"Design and Mathematical Model of Hybrid Cryptographic Algorithm-A3D Algorithm","volume":"3","author":"anjan","year":"2014","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"478","DOI":"10.1109\/TE.2013.2257785","article-title":"Teaching HW\/SW Co-Design With a Public Key Cryptography Application","volume":"56","author":"uhsadel","year":"2013","journal-title":"IEEE Tranactions in Education"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2010.2103190"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1016\/j.jpdc.2011.04.006","article-title":"FPGA Implementation and Performance Evaluation of a High Throughput Crypto Processor","volume":"71","author":"soliman","year":"2011","journal-title":"Elsevier Journal of Parallel and Distributed Computing"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1049\/iet-cdt.2016.0033","article-title":"High-Performance Elliptic Curve Cryptography Processor over NIST Prime Fields","volume":"11","author":"hossain","year":"2017","journal-title":"IET Journal on Computers and Digital Techniques"},{"key":"ref18","first-page":"1183","article-title":"A Light Weight Implementation of ECC Cryptosystem on FPGA for nodes in Wireless Sensor Networks","volume":"6","author":"leelavathi","year":"2017","journal-title":"Fifth International Journal of Advance Research in Science and Engineering"},{"key":"ref19","first-page":"8","author":"rahuman","year":"2013","journal-title":"Reconfigurable Architecture for Elliptic Curve Cryptography Using FPGA"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2016.7848043"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"12235","DOI":"10.3390\/s120912235","article-title":"Sensor Systems Based on FPGAs and their Applications: A Survey","volume":"12","author":"de la piedra","year":"2012","journal-title":"Journal of Sensors"},{"key":"ref6","first-page":"169","article-title":"Mapping an Arbitrary Message to an Elliptic Curve When Defined Over GF (2n)","volume":"8","author":"king","year":"2009","journal-title":"International Journal of Network Security"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"773","DOI":"10.21817\/ijet\/2017\/v9i2\/170902063","article-title":"Implementation of ECC on FPGA using Scalable Architecture with equal Data and Key for WSN","volume":"9","author":"leelavathi","year":"2017","journal-title":"International Journal of Engineering and Technology (IJET)"},{"key":"ref8","first-page":"2818","article-title":"Performance Analysis of Gold-Wasser Micali Cryptosystem","volume":"2","author":"shruthi","year":"2013","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref2","first-page":"31","article-title":"Resilience Against Node Capture Attack using Asymmetric Matrices in Key Predistribution Scheme in Wireless Sensor Networks","volume":"11","author":"manjula","year":"2011","journal-title":"International journal of computer science and en"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1024422"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.216"}],"event":{"name":"2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2018,7,10]]},"location":"Bangalore","end":{"date-parts":[[2018,7,12]]}},"container-title":["2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8476666\/8493493\/08493894.pdf?arnumber=8493894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T22:33:36Z","timestamp":1598222016000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8493894\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icccnt.2018.8493894","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}