{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:18Z","timestamp":1750306758952,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516930.2516946","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"17-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing ZigBee smart energy profile 1.x with OpenECC library"],"prefix":"10.1145","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Guang","family":"Gong","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"SEC1: Elliptic Curve Cryptography version 0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg.  SEC1: Elliptic Curve Cryptography version 0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg."},{"key":"e_1_3_2_1_2_1","unstructured":"SEC2: Recommended Elliptic Curve Domain Parameters version 2.0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg.  SEC2: Recommended Elliptic Curve Domain Parameters version 2.0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg."},{"key":"e_1_3_2_1_3_1","unstructured":"SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) v1.0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg.  SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) v1.0. Standards for Efficient Cryptography Group. http:\/\/www.secg.org\/index.php?action=secg docs_secg."},{"key":"e_1_3_2_1_4_1","unstructured":"Silicon Labs {nc. EM35x System-on-Chip (SoC) \/ Network Co-Processor (NCP). http:\/\/www.silabs.com\/products\/wireless\/zigbee\/Pages\/zigbee-chips-em35x.aspx.  Silicon Labs {nc. EM35x System-on-Chip (SoC) \/ Network Co-Processor (NCP). http:\/\/www.silabs.com\/products\/wireless\/zigbee\/Pages\/zigbee-chips-em35x.aspx."},{"key":"e_1_3_2_1_5_1","unstructured":"Texas Instruments Inc. Stellaris 2.4 GHz Zigbee Wireless Kit. http:\/\/www.ti.com\/lit\/ml\/spmt212\/spmt212.pdf.  Texas Instruments Inc. Stellaris 2.4 GHz Zigbee Wireless Kit. http:\/\/www.ti.com\/lit\/ml\/spmt212\/spmt212.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"Zigbee Ove-the-Air Upgrading Cluster. http:\/\/www.zigbee.org\/Standards\/ZigBeeSmartEnergy\/Overview.aspx.  Zigbee Ove-the-Air Upgrading Cluster. http:\/\/www.zigbee.org\/Standards\/ZigBeeSmartEnergy\/Overview.aspx."},{"key":"e_1_3_2_1_7_1","unstructured":"Zigbee Smart Energy Profile Specification. http:\/\/www.zigbee.org\/Standards\/ZigBeeSmartEnergy\/Overview.aspx.  Zigbee Smart Energy Profile Specification. http:\/\/www.zigbee.org\/Standards\/ZigBeeSmartEnergy\/Overview.aspx."},{"key":"e_1_3_2_1_8_1","unstructured":"Zigbee Technology. http:\/\/www.zigbee.org\/About\/AboutTechnology\/ZigBeeTechnology.aspx.  Zigbee Technology. http:\/\/www.zigbee.org\/About\/AboutTechnology\/ZigBeeTechnology.aspx."},{"key":"e_1_3_2_1_9_1","unstructured":"IEEE 802.15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs) October 2003. http:\/\/standards.ieee.org\/getieee802\/download\/802.15.4--2003.pdf.  IEEE 802.15.4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (LR-WPANs) October 2003. http:\/\/standards.ieee.org\/getieee802\/download\/802.15.4--2003.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.3934\/amc.2010.4.169"},{"key":"e_1_3_2_1_11_1","unstructured":"Certicom. Certicom issues over 26 million zigbee smart energy device certificates. http:\/\/www.certicom.com\/index.php\/component\/content\/article\/15-security-news-\/751-certicom-issues-over-26-millionzigbee-smart-energy-device-certificates.  Certicom. Certicom issues over 26 million zigbee smart energy device certificates. http:\/\/www.certicom.com\/index.php\/component\/content\/article\/15-security-news-\/751-certicom-issues-over-26-millionzigbee-smart-energy-device-certificates."},{"volume-title":"Inc.","year":"2002","author":"Daemen J.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Hankerson A. Menezes and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer Publishing Company Incorporated 1st edition 2010.   D. Hankerson A. Menezes and S. Vanstone. Guide to Elliptic Curve Cryptography. Springer Publishing Company Incorporated 1st edition 2010.","DOI":"10.1007\/978-3-642-27739-9_245-2"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"N.\n       \n      Koblitz\n    .\n      \n  \n   \n  CM-curves with good cryptographic properties. In J. Feigenbaum editor Advances in Cryptology - CRYPTO'91 volume \n  576\n   of \n  Lecture Notes in Computer Science pages \n  279\n  --\n  287\n  . \n  Springer Berlin Heidelberg 1992\n  .   N. Koblitz. CM-curves with good cryptographic properties. In J. Feigenbaum editor Advances in Cryptology - CRYPTO'91 volume 576 of Lecture Notes in Computer Science pages 279--287. Springer Berlin Heidelberg 1992.","DOI":"10.1007\/3-540-46766-1_22"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"J.\n       \n      L\u00f3pez\n     and \n      \n      \n      R.\n       \n      Dahab\n      \n  \n  . \n  Improved algorithms for elliptic curve arithmetic in GF(2n). In S. Tavares and H. Meijer editors Selected Areas in Cryptography volume \n  1556\n   of \n  Lecture Notes in Computer Science pages \n  201\n  --\n  212\n  . \n  Springer Berlin Heidelberg 1999\n  .   J. L\u00f3pez and R. Dahab. Improved algorithms for elliptic curve arithmetic in GF(2 n ). In S. Tavares and H. Meijer editors Selected Areas in Cryptography volume 1556 of Lecture Notes in Computer Science pages 201--212. Springer Berlin Heidelberg 1999.","DOI":"10.1007\/3-540-48892-8_16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"J.\n       \n      L\u00f3pez\n     and \n      \n      \n      R.\n       \n      Dahab\n      \n  \n  . \n  High-speed software multiplication in F2m. In B. Roy and E. Okamoto editors Progress in Cryptology - INDOCRYPT\n   \n  2000 volume \n  1977\n   of \n  Lecture Notes in Computer Science pages \n  203\n  --\n  212\n  . \n  Springer Berlin Heidelberg 2000.   J. L\u00f3pez and R. Dahab. High-speed software multiplication in F 2 m. In B. Roy and E. Okamoto editors Progress in Cryptology - INDOCRYPT 2000 volume 1977 of Lecture Notes in Computer Science pages 203--212. Springer Berlin Heidelberg 2000.","DOI":"10.1007\/3-540-44495-5_18"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1387663.1387668"},{"key":"e_1_3_2_1_20_1","unstructured":"A. Menezes P. C. van Oorschot and S. Vanstone. Handbook of Applied Cryptography. CRC Press Inc. Boca Raton FL USA 1st edition 1996.   A. Menezes P. C. van Oorschot and S. Vanstone. Handbook of Applied Cryptography. CRC Press Inc. Boca Raton FL USA 1st edition 1996."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"V. S.\n       \n      Miller\n    .\n      \n  \n   \n  Use of elliptic curves in cryptography. In H. Williams editor Advances in Cryptology - CRYPTO'85 volume \n  218\n   of \n  Lecture Notes in Computer Science pages \n  417\n  --\n  426\n  . \n  Springer Berlin Heidelberg 1986\n  .   V. S. Miller. Use of elliptic curves in cryptography. In H. Williams editor Advances in Cryptology - CRYPTO'85 volume 218 of Lecture Notes in Computer Science pages 417--426. Springer Berlin Heidelberg 1986.","DOI":"10.1007\/3-540-39799-X_31"},{"key":"e_1_3_2_1_22_1","unstructured":"NIST. NIST SP 800--38C Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800--38C July 2007.  NIST. NIST SP 800--38C Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. NIST Special Publication 800--38C July 2007."},{"key":"e_1_3_2_1_23_1","unstructured":"NIST. NIST SP 800--90A Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800--90A January 2012.  NIST. NIST SP 800--90A Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publication 800--90A January 2012."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"D. A.\n       \n      Osvik J. W.\n       \n      Bos D.\n       \n      Stefan and \n      \n      \n      D.\n       \n      Canright\n      \n  \n  . \n  Fast software aes encryption. In S. Hong and T. Iwata editors Fast Software Encryption volume \n  6147\n   of \n  Lecture Notes in Computer Science pages \n  75\n  --\n  93\n  . \n  Springer Berlin Heidelberg 2010\n  .   D. A. Osvik J. W. Bos D. Stefan and D. Canright. Fast software aes encryption. In S. Hong and T. Iwata editors Fast Software Encryption volume 6147 of Lecture Notes in Computer Science pages 75--93. Springer Berlin Heidelberg 2010.","DOI":"10.1007\/978-3-642-13858-4_5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e91-d.5.1338"},{"volume-title":"Morgan Kaufmann Publishers","year":"2004","author":"Sloss A. N.","key":"e_1_3_2_1_26_1"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008306223194"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"G. N. Sorebo and M. C. Echols. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid. CRC Press Inc. Boca Raton FL USA 1st edition 2011.   G. N. Sorebo and M. C. Echols. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid. CRC Press Inc. Boca Raton FL USA 1st edition 2011.","DOI":"10.1201\/b11300"},{"key":"e_1_3_2_1_29_1","unstructured":"TinyPKC. A Port of the CyaSSL Implentation of RSA and ECC to TinyOS 2.x. http:\/\/www-db.in.tum.de\/ kothmayr\/tinypkc\/.  TinyPKC. A Port of the CyaSSL Implentation of RSA and ECC to TinyOS 2.x. http:\/\/www-db.in.tum.de\/ kothmayr\/tinypkc\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11935308_37"}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the first ACM workshop on Smart energy grid security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516930.2516946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:39Z","timestamp":1750231719000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516930.2516946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":30,"alternative-id":["10.1145\/2516930.2516946","10.1145\/2516930"],"URL":"https:\/\/doi.org\/10.1145\/2516930.2516946","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}