{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,24]],"date-time":"2025-10-24T07:58:45Z","timestamp":1761292725093,"version":"3.28.0"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,4]]},"DOI":"10.1109\/wcnc.2010.5506580","type":"proceedings-article","created":{"date-parts":[[2010,7,20]],"date-time":"2010-07-20T18:48:08Z","timestamp":1279651688000},"page":"1-6","source":"Crossref","is-referenced-by-count":72,"title":["TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks"],"prefix":"10.1109","author":[{"given":"Xiaokang","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Xiaotie","family":"Deng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/NCA.2009.30"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1587\/transinf.E92.D.909"},{"year":"1999","author":"ian","journal-title":"Elliptic Curves in Cryptography","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1093\/ietfec\/e89-a.1.115"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/s00145-007-9005-7"},{"year":"0","article-title":"TinyPairing library for wireless sensor networks","key":"ref15"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/s10623-006-9033-6"},{"year":"0","journal-title":"a free and open source component-based operating system and platform targeting wireless sensor networks (WSNs)","key":"ref17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ARITH.2007.10"},{"key":"ref19","article-title":"New explicit conditions of elliptic curve traces for FR-reduction","volume":"e84a","author":"miyaji","year":"2001","journal-title":"IEICE Trans Fundamentals"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/PERCOMW.2007.56"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1007\/11535218_16","article-title":"Collusion resistant broadcast encryption with short ciphertexts and private keys","author":"boneh","year":"2005","journal-title":"Advances in Cryptology CRYPTO 2005 volume 3621 of LNCS"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/978-3-540-89641-8_9","article-title":"A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks","author":"galindo","year":"2008","journal-title":"Proceedings of the 7th International Conference on Cryptology and Network Security (CANS)"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/WiMob.2008.79"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/NCA.2007.48"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","article-title":"Short signatures from the WeiI pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology-Asiacrypt 2001"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/INSS.2008.4610921"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","article-title":"Identity-based encryption from the Weil pairing","author":"boneh","year":"2001","journal-title":"Advances in Cryptology- CRYPTO 2001 LNCS 2139"},{"key":"ref20","first-page":"918","article-title":"Monte Carlo methods for index computation (mod) p","volume":"32","author":"pollard","year":"1978","journal-title":"Mathematics of Computation"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1007\/3-540-45682-1_5","article-title":"Unbelievable security matching AES security using public key systems","volume":"2248","author":"lenstra","year":"2001","journal-title":"Proc of Asiacrypt 2001 LNCS"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TIT.1984.1056941"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-3-642-10433-6_28","article-title":"Multi-core implementation of the tate pairing over supersingular elliptic curves","author":"beuchat","year":"2009","journal-title":"The 8th International Conference on Cryptology And Network Security (CANS 2009)"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TIT.1973.1055100"},{"key":"ref25","first-page":"71","article-title":"A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography","author":"malan","year":"2004","journal-title":"Proc IEEE Sens Ad Hoc Commun Netw Conf"}],"event":{"name":"Networking Conference (WCNC)","start":{"date-parts":[[2010,4,18]]},"location":"Sydney, Australia","end":{"date-parts":[[2010,4,21]]}},"container-title":["2010 IEEE Wireless Communication and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5504893\/5506094\/05506580.pdf?arnumber=5506580","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T11:08:06Z","timestamp":1497870486000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5506580\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2010.5506580","relation":{},"subject":[],"published":{"date-parts":[[2010,4]]}}}