{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,20]],"date-time":"2026-04-20T10:35:25Z","timestamp":1776681325036,"version":"3.51.2"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/wowmom.2016.7523559","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T13:45:32Z","timestamp":1470404732000},"page":"1-6","source":"Crossref","is-referenced-by-count":22,"title":["Towards quantifying the cost of a secure IoT: Overhead and energy consumption of ECC signatures on an ARM-based device"],"prefix":"10.1109","author":[{"given":"Max","family":"Mossinger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Benedikt","family":"Petschkuhn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Johannes","family":"Bauer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ralf C.","family":"Staudemeyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Wojcik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henrich C.","family":"Pohls","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref31","first-page":"2","article-title":"A signature scheme with message recovery based on elliptic curves","volume":"2","author":"zhao","year":"2005","journal-title":"Computing in Science & Eng"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0920-5489(03)00069-2"},{"key":"ref10","year":"2014","journal-title":"ecc-light-certificate library"},{"key":"ref11","article-title":"Optimization of Public Key Cryptography (RSA and ECC) for 16-bits Devices based on 6LoWPAN","author":"ayuso","year":"2010","journal-title":"1st International Workshop on the Security of the Internet of Things"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS.2010.5724742"},{"key":"ref13","first-page":"1","article-title":"Using elliptic curves on RFID tags","volume":"2","author":"braun","year":"2008","journal-title":"Int J Comput Sci Netw Security"},{"key":"ref14","year":"2015","journal-title":"Re-MOTE"},{"key":"ref15","article-title":"ISO-IEC 7498&#x2013;2","year":"1989","journal-title":"Information Processing Systems Open Systems Interconnection Basic Reference Model Part 2 Security Architecture"},{"key":"ref16","first-page":"306","article-title":"JSON Sensor Signatures (JSS): end-to-end integrity protection from constrained device to IoT application","author":"p\u00f6hls","year":"2015","journal-title":"Proc of the Workshop on Extending Seamlessly to the Internet of Things (esIoT)"},{"key":"ref17","article-title":"Secure Hash Standard","author":"dang","year":"2015","journal-title":"National Institute of Standards and Technology Gaithersburg MD Tech Rep"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16295-9_4"},{"key":"ref19","author":"pi\u00f1ol pi\u00f1ol","year":"2014","journal-title":"Implementation and evaluation of BSD Elliptic Curve Cryptography"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7515"},{"key":"ref4","article-title":"Digital Signature Standard (DSS)","year":"2013","journal-title":"Gaithersburg MD Tech Rep"},{"key":"ref27","article-title":"Raspberry Pi - AddOn - Der A\/D-Wandler MCP3008 v1.3","author":"bartmann","year":"2012","journal-title":"adafruit Tech Rep"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"ref6","first-page":"7748","article-title":"Elliptic curves for security","author":"langley","year":"2016","journal-title":"IRTF RFC 7748 Tech Rep"},{"key":"ref29","first-page":"7","article-title":"Digital Signature Scheme with message recovery using Knapsack-based ECC","volume":"12","author":"ramasamy","year":"2011","journal-title":"IJ Network Security"},{"key":"ref5","first-page":"109","article-title":"How to manipulate curve standards: a white paper for the Black Hat","volume":"2014","author":"bernstein","year":"2015","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"ref7","author":"moeller","year":"2015","journal-title":"IETF Draft EdDSA and Ed25519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39799-X_31"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"ref1","article-title":"Internet of Things research study","year":"2015","journal-title":"Tech Rep"},{"key":"ref20","author":"mackay","year":"2016","journal-title":"Micro-ecc"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"ref21","author":"m\u00f6ssinger","year":"2016","journal-title":"Measurement of Elliptic Curve Cryptography implementations for Contiki on a Re-MOTE"},{"key":"ref24","author":"dunkels","year":"2016","journal-title":"The Contiki operating system"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-012-0027-1"},{"key":"ref26","first-page":"40","year":"2005","journal-title":"Microchip Technology Inc"},{"key":"ref25","author":"instruments","year":"0","journal-title":"CC2538 a powerful System-On-Chip for 2 4-GHz IEEE 802 15 4 and ZigBee applications"}],"event":{"name":"2016 IEEE 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","location":"Coimbra","start":{"date-parts":[[2016,6,21]]},"end":{"date-parts":[[2016,6,24]]}},"container-title":["2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7518125\/7523483\/07523559.pdf?arnumber=7523559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:16:43Z","timestamp":1558477003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7523559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2016.7523559","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}