{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:03:36Z","timestamp":1771614216437,"version":"3.50.1"},"reference-count":68,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/sahcn.2004.1381904","type":"proceedings-article","created":{"date-parts":[[2005,4,6]],"date-time":"2005-04-06T11:12:58Z","timestamp":1112785978000},"page":"71-80","source":"Crossref","is-referenced-by-count":349,"title":["A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography"],"prefix":"10.1109","author":[{"given":"D.J.","family":"Malan","sequence":"first","affiliation":[]},{"given":"M.","family":"Welsh","sequence":"additional","affiliation":[]},{"given":"M.D.","family":"Smith","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","author":"rosing","year":"1999","journal-title":"Implementing Elliptic Curve Cryptography"},{"key":"36","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44750-4_4","article-title":"Fast key exchange with elliptic curve systems","volume":"963","author":"schroeppel","year":"1995","journal-title":"Lecture Notes in Computer Science"},{"key":"33","article-title":"An overview of elliptic curve cryptography","author":"lo?pez","year":"2000","journal-title":"Tech Rep"},{"key":"34","author":"barwood","year":"1997","journal-title":"Elliptic Curve Cryptography FAQ V1 12 22nd"},{"key":"39","author":"marsaglia","year":"1994","journal-title":"The Mother of All Random Generators"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_22"},{"key":"38","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/BFb0052248","article-title":"An improved algorithm for arithmetic on a family of elliptic curves","author":"solinas","year":"1997","journal-title":"Advances in Cryptology - CRYPTO'97"},{"key":"43","article-title":"High-speed software multiplication in script F sign2m","author":"lo?pez","year":"2000","journal-title":"Tech Rep"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546570"},{"key":"41","year":"2000","journal-title":"IEEE Standard Specifications for Public-Key Cryptography"},{"key":"40","year":"2003","journal-title":"JBorZoi 0 9"},{"key":"67","author":"denis","year":"0","journal-title":"LibTomCrypt"},{"key":"66","year":"0","journal-title":"Multiprecision Integer and Rational Arithmetic C\/c++ library"},{"key":"68","year":"0"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1979.2"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1137\/0406010"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/BF00123958"},{"key":"25","article-title":"Digitalized signatures and public-key functions as intractable as factorization","volume":"mit lcs tr 212","author":"rabin","year":"1979","journal-title":"Tech Rep"},{"key":"26","year":"2000","journal-title":"Remarks on the Security of the Elliptic Curve Cryptosystem"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0011-x"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"3","year":"0","journal-title":"Vital Dust Wireless Sensor Networks for Emergency Medical Care"},{"key":"2","article-title":"Two-tiered wireless sensor network architecture for structural health monitoring","author":"kottapalli","year":"2003","journal-title":"SPIE's International Symposium on Smart Structures and Materials"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/371626.371720"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/990680.990707"},{"key":"30","author":"frey","year":"1998","journal-title":"How to Disguise An Elliptic Curve (Weil Descent)"},{"key":"6","author":"karlof","year":"0","journal-title":"Tinysec Link Layer Security for Tiny Devices"},{"key":"5","year":"0","journal-title":"Mica2 Wireless Measurement System"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1006\/jagm.1997.0913"},{"key":"4","year":"2002","journal-title":"NEST Challenge Architecture"},{"key":"31","article-title":"Implementation options for finite field arithmetic for elliptic curve cryptosystems","author":"paar","year":"1999","journal-title":"3rd Workshop on Elliptic Curve Cryptography (ECC'99)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031515"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381696"},{"key":"59","article-title":"Elliptic curve cryptography on a palm OS device","author":"weimerskirch","year":"2001","journal-title":"Proc 7th Australasian Conf Information Security and Privacy"},{"key":"58","first-page":"365","article-title":"Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers","author":"guajardo","year":"2001","journal-title":"PKC 2001"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986860"},{"key":"56","first-page":"98","article-title":"A small and fast software implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer","volume":"e82 a","author":"hasegawa","year":"1999","journal-title":"IEICE Trans Fundamentals"},{"key":"19","year":"2003","journal-title":"Diffie-Hellman 1"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35528-3_5"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/BF00124891"},{"key":"18","year":"2003","journal-title":"Special Publication 800-57 Recommendation for Key Management"},{"key":"15","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"13","year":"1994","journal-title":"Federal Information Processing Standards Publication 185 Escrowed Encryption Standard (EES)"},{"key":"14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1007\/3-540-48910-X_2","article-title":"Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials","volume":"1592","author":"biham","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"key":"11","article-title":"Comparing elliptic curve cryptography and RSA on 8-bit CPUs","author":"gura","year":"2004","journal-title":"Proc 5th Int l Workshop Cryptographic Hardware and Embedded Systems"},{"key":"12","year":"1988","journal-title":"SkipJack and KEA algorithm Specifications"},{"key":"21","volume":"243","author":"perlman","year":"0","journal-title":"Computer Science"},{"key":"20","year":"0","journal-title":"Engineering Datasheet Energizer No X91"},{"key":"64","author":"zaroliagis","year":"0","journal-title":"ECC-LIB a Library for Elliptic Curve Cryptography"},{"key":"65","year":"0"},{"key":"62","author":"lenstra","year":"1999","journal-title":"Selecting Cryptographic Key Sizes"},{"key":"63","year":"0","journal-title":"Standards for Efficient Cryptography Group"},{"key":"60","article-title":"PGP in constrained wireless devices","author":"brown","year":"2000","journal-title":"Proceedings of the 9th Usenix Security Symposium"},{"key":"61","year":"0","journal-title":"ZigBee Alliance"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.2307\/2007970"},{"key":"48","author":"grosscha?dl","year":"2003","journal-title":"Implementation Options for Elliptic Curve Cryptography Http \/\/www iaik mgraz at\/teaching\/02_it-sicherheit\/04_vortragsthemen\/ E%CC pdf"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103434"},{"key":"44","article-title":"Software implementation of elliptic curve cryptography over binary fields","volume":"1965","author":"hankerson","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"47","year":"1999","journal-title":"Recommended Elliptic Curves for Federal Government Use"},{"key":"46","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-49649-1_10","article-title":"Elliptic curve discrete logarithms and the index calculus","author":"silverman","year":"1998","journal-title":"ASIACRYPT Advances in Cryptology - ASIACRYPT International Conference on the Theory and Application of Cryptology"},{"key":"10","author":"watro","year":"2003","journal-title":"Lightweight Security for Wireless Networks of Embedded Systems"},{"key":"51","article-title":"Generalized mersenne numbers","volume":"corr 39","author":"solinas","year":"1999","journal-title":"Tech Rep"},{"key":"52","author":"woodbury","year":"2001","journal-title":"Efficient Algorithms for Elliptic Curve Cryptosystems on Embedded Systems"},{"key":"53","author":"jung","year":"0","journal-title":"A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n)"},{"key":"54","first-page":"386","article-title":"Smart card crypto-coprocessors for public-key cryptography","author":"handschuh","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"50","article-title":"Implementing the rivest shamir and adleman public key encryption algorithm on a standard digital signal processor","volume":"263","author":"barrett","year":"1987","journal-title":"Advances in Cryptology - CRYPTO'86"}],"event":{"name":"2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.","location":"Santa Clara, CA, USA"},"container-title":["2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9491\/30129\/01381904.pdf?arnumber=1381904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,9]],"date-time":"2019-02-09T20:14:14Z","timestamp":1549743254000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1381904\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/sahcn.2004.1381904","relation":{},"subject":[]}}