Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. To extend the span of sensor network, new nodes deployment is necessary. To prevent malicious nodes from joining the sensor networks, access control is a designed requirement for controlling sensor node deployment. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor networks. The proposed scheme not only prevents malicious nodes from joining sensor networks, but also key establishment is included in the authentication procedure. Compared to the previously proposed schemes, the authentication procedure and common key generation of the proposed method are very simple and efficient. It could offer computational efficiency, energy, and bandwidth savings. In addition, it can be easily implemented as a dynamic access control, because all the old secret keys and information in existing nodes should not be updated once a new node is added or an old node is lost.
1. Introduction
Wireless sensor networks applied to the monitoring of physical environments have recently emerged as an important infrastructure. It usually consists of one or more base stations and lots of sensor nodes, which are densely deployed either inside the phenomenon or very close to it. To save manufacturing, a sensor node is usually built as a small device, which has limited memory, a low-end processor, and is powered by a battery [1]. The position of sensor nodes need not to be engineered or predetermined. This allows random deployment in inaccessible terrain or disaster relief operations. Therefore, sensor networks are being deployed for a wide variety of applications, including military sensing and tracking, patient monitoring, and environmental monitoring, and airport and home security [1, 2]. Owing to the property of sensor devices, sensor networks may easily be compromised by adversaries who modify messages or provide misleading information to other sensor nodes. To prevent information and communication systems from illegal delivery and modification, the receiver must authenticate messages transmitted from the sensor nodes over a wireless sensor network.
Because of the sensor devices, after several days or weeks of operation, some nodes in the network may exhaust their power or lost. That is, nodes in a sensor network may exhaust their battery or be stolen by malicious attacks. In addition, some nodes may be destroyed by adversaries so that the entire network may become useless. To extend the lifetime of the sensor network, new node deployment is necessary. However, an adversary can also deploy malicious nodes into the network for eavesdropping purposes or insert false reports. Hence, a new node should prove that it is a legitimate node through the authentication.
Today, the practical option for the distribution of keys to the sensor nodes of wireless sensor networks rely on key predistribution. That is, keys are preinstalled in the sensor nodes, and the nodes having a common key are provided with a secure connection between them. One solution is all the nodes carrying a master secret key. Any pair of nodes can use this master key to achieve key agreement and obtain a new common key [3]. This procedure does not exhibit network resiliency: if the master secret key is compromised by one node, the security of the entire sensor network will be compromised. Recently, many key predistribution schemes were proposed to protect sensor networks [4–8]. They provide that any pair of sensor nodes can find a common shared key between them with simple calculations, and this common key is pairwise. Then, it could reduce the risk of the entire sensor network. However, the above-mentioned key predistribution schemes cannot be easily implemented as a dynamic access control, because all the old secret keys and information of existing nodes should be updated once a new node is added.
To prevent malicious nodes from joining the sensor networks, access control is required in the design for controlling new nodes deployment. Some approaches [9, 10] try to detect malicious nodes after they join the sensor networks, but adversaries can still attack the networks [11]. Besides, the authors in [12, 13] proposed key management protocols called LEAP and LEAP+ for sensor networks. They assumed that each sensor node can sustain a tolerance time interval before it is compromised. That is, the adversary cannot compromise a sensor node within a time interval. Their scheme can establish a pairwise key shared between any two neighboring sensor nodes by exchanging their identities. Later, Wang et al. proposed an access control for sensor networks [14]. In their scheme, they assume an offline certification authority (CA) that deploys an ECC cryptosystem and maintains a secret polynomial function f() of degree t. The basic idea of Wang et al.'s scheme is that usershave to be authenticated and endorsed by t local sensors before they can send the remote query. They develop a threshold endorsement scheme (inspired by the Shamir's secret sharing [15]) to perform the remote access control. Then, the secret polynomial function f() of degree t may not be flexibly updated for applications. To the best of our knowledge, recently, Zhou et al. [11] proposed an access control protocol based on ECC for sensor networks that are more efficient than those public key-based schemes. Their scheme can prevent malicious nodes from joining sensor networks at the very beginning, and key establishment is also included in their access control protocol. In their scheme [11], two sensor nodes may have the same bootstrapping time if deployed simultaneously. Besides, they also suppose that the adversary cannot compromise a sensor node within a time interval. It is the same assumption in [12, 13]. However, it is required to send twenty one transmissions in Zhou et al.'s authentication protocol [11]. The bandwidth consumption rates are quite demanding and likely to bottleneck in many applications.
Compared to RSA [16], it has been shown that 160-bit ECC provides comparable security to 1024-bit RSA, and 224-bit ECC provides comparable security to 2048-bit RSA [17–19]. Hence, under the same security level, smaller key sizes of ECC offer merits of computational efficiency, as well as memory, and bandwidth saving. Sensor nodes adopt 802.15.4 standard which allows a variable payload of up to 102 bytes [20]. Such a packet provides enough space to include digital signature for broadcast authentication [20]. Moreover, in Wang et al.'s experiment [14], they show that the public key-based protocol is more advantageous than the symmetric key in terms of the memory usage, message complexity, and security resilience. Therefore, based on ECC and the concept of Schnorr signature [21], this paper designs a simple access control protocol to prevent malicious nodes joining sensor networks, and key establishment is also included in the authentication protocol.
The new access control protocol uses the concept of timebound in which once time period has elapsed the sensor node in wireless network cannot access any data for future time period. It means that each node has its own expiration time of w, then the node can achieve authentication and communication to other nodes in the z time period if and only if the time period . Once the time period elapses, this node cannot achieve authentication and communication to other nodes for any useful messages. So, our access control in wireless sensor networks is constrained by the time period. Our purpose is to protect future messages. That is, the impact of the node compromises attack to be decreased or minimized. In the proposed scheme, it actually divides the total time into t time periods, starting with l. The time is not necessarily a real time. Compared with Zhou et al.'s scheme, the authentication procedure and common key generation of the proposed scheme are very simple and efficient for each sensor node. And it does not suppose that each sensor node can sustain a tolerance time interval before it is compromised. In addition, the proposed scheme can be easily implemented as a dynamic access control, because the old secret keys and information of existing nodes should not be changed once a new node is added. Comparing to Zhou et al.'s scheme, the proposed scheme could significantly reduce the overhead of communications for sensor nodes to achieve secure connectivity. It could offer more energy and bandwidth savings than Zhou et al.'s scheme.
The rest of this paper is organized as follows. In Section 2, this paper will introduce a new access control in sensor networks. The security analyses and the performance of the proposed scheme are discussed in Section 3. Some conclusions are given in Section 4.
2. The Proposed Scheme
At the very beginning of a network, a lot of sensor nodes are deployed in a designated area. New node deployment is inevitable, because nodes in a sensor network may be lost or destroyed. We assume that all sensor nodes have the same transmission range and communication with each other. And, the time during the wireless network is divided into t periods, numbered . For simplicity, we let t be an integer; that is, the system ends at time t. This maximum number of (expired) time period t should not be considered as a limitation of the system. For example, if each time period represents twenty minutes, then denotes roughly five days. Using the concepts of Schnorr signature [21] and based on ECC, we will develop an access control method to prevent malicious nodes from joining sensor networks. Without loss of generality, the proposed method would accomplish two tasks.
Node Authentication. a deployed node establishes its identity with its neighboring nodes and shows that it has the right to access the sensor network through authentication.
Key Establishment. through authentication, shared keys should be created between a deployed node and its neighboring nodes to provide secure communication. This guarantees that any two sensor nodes can find a common shared key between themselves. This shared key is pairwise. A shared key refers to the relationship between the node and one of its direct neighbors.
The proposed method consists of an initialization phase and an authentication and key establishment phase. The basic idea is stated as follows.
Initialization Phase
(1) Before a sensor network is deployed, the system (trusted center or base station) chooses a large prime number and an elliptic curve (the elliptic curve E is over the finite field ); a cyclic group of points over the elliptic curve , where P is the generator of the group and has an order n of at least 160 bits [17–19, 22]. It provides , and its point at infinity is O. Then, the system selects a secret key and computes the system's public key of the point over the elliptic curve . Next, the system (or base station) chooses a secure one-way hash function .
(2) Suppose that there are a number of v neighborhood nodes with identities in a designated area. For each node , the system (or base station) first generates a random number and the expiration time then computes the point and the value , where . Next, the system preloads the elliptic curve , the system's public key Q, the generator P of the group over the elliptic curve , one-way hash function , its expiration time , and the secret pair to node , for . Here, “” is the concatenation of operation; and are the x-component and y-component of point , respectively.
Authentication and Key Establishment Phase
Suppose that the time period is T now. The processes of authentication and key establishment for two nodes and are described in the following steps.
Step 1.
The node generates a random number and computes the point over the elliptic curve , then it sends and its identity to the node . Similarly, node generates a random number and computes the point over elliptic curve then it sends and its identity to node . For security, the random numbers and cannot be reused.
Step 2.
After receiving , node computes a shared session key and , where . Then, it delivers the signature , the expiration time of , and its point to node . Here, and are the x-component and y-component of point , respectively. Similarly, after receiving , node computes a shared session key and , where . Then, it also delivers the signature , the expiration time , and its point to node .
To make sure that node is a legitimate node and confirms their shared session key , node carries out the following steps.
Node first compares 's expiration time with the broadcasted time period T from the system. If the expiration time then node is rejected and continued otherwise.
It computes and .
It checks whether the equality holds, where Q is the public point of the system.
The signature is accepted if the answer is yes and rejected otherwise. In the same way, from the signature , the expiration time , and its point of node ; if and hold, then node can verify the identity of node , where and . Thus, two nodes, and , could achieve mutual authentication and generate a common session key . The above authentication and key establishment are briefly illustrated in Figure 1.
The proposed authentication and key establishment protocol.
According to the Diffie-Hellman algorithm over elliptic curve [23], it provides that over elliptic curve . Hence, two nodes, and , can obtain their common shared key by using their secret parameter and , respectively. This common shared key is pairwise. Therefore, by means of the signature verification, any pair of nodes and can mutually authenticate each other and construct a shared session key for securing communications. For security and creating a different session key for nodes and , the random numbers and should be used only once. In the following, we state the correctness of the signature verification.
To make sure the validity of node and their shared key for node , the equality always holds, while the signature , the expiration time , and the point of node are correct, where Q is the public point of the system. According to the authentication and key establishment phase, the node can compute a shared session key , , and . Since and , then it has , where , , and . Therefore, node can confirm the legality of node and generate a common session key .
Adding a New Node
During the network operation phase, if some sensor nodes are lost or destroyed, new sensor nodes need to be deployed. When a new node with identity is added, the system (or base station) first generates a random number and its expiration time , and then computes the point and the secret key , where . Next, the system preloads the elliptic curve , the system's public key Q, the generator P of the group over the elliptic curve , the one-way hash function , its expiration time of , and the secret pair to the new node . The authentication and key establishment for any old node with the new node is the same as the above authentication and key establishment phase. In addition, the other information in existing nodes is not updated. Hence, the proposed scheme can be easily implemented as a dynamic access control, because all the old secret keys and messages of existing nodes need not be changed once a new node is added or an old node is lost.
3. Discussions
The proposed scheme is based on the ECC. Thus, the security of our scheme is founded in the difficulty of solving the discrete logarithm problem in . We will review some security terms needed for security analysis [17–19, 22, 23].
Definition 1.
A secure hash function, , is one-way; if given x, it is easy to compute ; however, given y, it is hard to compute .
Definition 2.
The elliptic curve discrete logarithm problem (ECDLP) in is as follows: given with order n (that is ) and Q is a point in the cyclic group . It is intractable to find r such that .
Definition 3.
The elliptic curve computational Diffie-Hellman problem (ECDHP) is as follows: given and over elliptic curve , it is hard to compute for any positive integers and .
Next, we will discuss the security and performance of our scheme as follows.
3.1. Security Analysis
The security of the proposed scheme can be showed as follows.
3.1.1. Sensor Node Replication Attack
In this attack [10], an adversary can deploy malicious nodes which are clones of a compromised node into the sensor network. In the proposed scheme, for each node , the system (or base station) first gives the expiration time and generates a random number for the node then computes the point and the value , where . Next, the system preloads the elliptic curve , the system's public key Q, the generator P of the group over the elliptic curve , the one-way hash function , and the secret pair to node . Thus, based on the timebounded , the secret key of node is computed by , where . Therefore, once the time period elapses, the clones of a compromised node cannot impersonate the real node of to achieve authentication and communication to other nodes for any future messages. Hence, the proposed method can withstand the sensor node replication attack. On the other hand, the public key and x is the private key of the system. Based on the elliptic curve discrete logarithm problem (ECDLP), with points and Q, it is very difficult for anyone to obtain the secret number and x. Then, even if knowing , an attacker cannot easily derive the private key x of the system. Without the private key x, it is extremely hard for the attacker to achieve the sensor node replication attack.
3.1.2. Sybil Attack
In this attack, a malicious sensor claims multiple IDs (identities) or locations [24]. In the proposed scheme, the secret key of node is to use the timebounded and the identity for computing and . Therefore, a compromised node cannot claim a new identity in the vicinity of node . It can withstand the Sybil attack [24]. Therefore, without knowing x, it is very difficult for an adversary to update the expiration time and the identity so that the node might construct communication with other nodes through authentication. On the other hand, if node is compromised within its lifetime , then the adversary can impersonate and even mount a Sybil attack for the time . However, once the time period elapses, the adversary cannot impersonate to achieve authentication and communication to other nodes for any useful messages. Thus, without the knowledge of x, the malicious sensor node cannot successfully impersonate other nodes to inject forged data into the sensor network. To reduce the Sybil attack for this case, the lifetime for each node may be shorter. That is the impact of the node compromise attack to be decreased or minimized. It could be dependent on the applications and its area for a node.
3.1.3. Wormhole Attack
In this attack, an adversary tries to tunnel normal messages between a new node and other distant old nodes so that these nodes might construct communication through handshakes. This attack does not compromise any sensor node, but it may lead to many serious threats, for example, the chaos of the routing operations [9, 25]. However, in our authentication, the secret key of node is based on the timebounded. Once the time period has elapsed, an adversary could not use the Wormhole attack to establish a tunnel between a new node and other distant old nodes. Thus, for each node , using x and the expiration time , only the system can generate the secret key for the node such that the signature verification holds, where , , and . Without knowing the private key x of the system, an attacker cannot easily forge the system to deploy new nodes in the sensor networks.
3.1.4. Key Establishment
Based on the ECDLP, even if attackers can obtain and , it is very hard for them to derive the random numbers and from and . Without knowing and , an attacker obtains nothing about the shared key for nodes and . It is based on the elliptic curve computational Diffie-Hellman problem (ECDHP) [23]. Hence, the proposed method can generate a shared key for secure communications. Moreover, a common key between two nodes is pairwise. If the common key of nodes and is compromised, without knowing any other nodes' session keys , it would not be helpful for the attacker to obtain other nodes' messages.
3.1.5. Mutual Authentication
In the proposed authentication and key establishment phase, after receiving information and , only the legal nodes and can derive their signatures and with their secret key and , respectively. Here, , , and . Through signature verification, if two equations and hold, then two nodes and could achieve mutual authentication and generate a common session key . Moreover, based on the ECC public key infrastructure, each sensor node does not know the secret keys of other nodes, and each shared common key is only known to neighboring nodes that created it. Hence, based on the security of Schnorr signature [21], without knowing the private key x or the secret key of node , no one can easily masquerade as the system or the node to compute the actuality signature of for cheating other nodes. Therefore, it can withstand a forgery attack. On the other hand, the random numbers and are used only once. It can resist the reply attack.
3.1.6. No Entire Secret Exposure
If the secret key of node is compromised, an attacker can only forge node to construct the new pairwise key between nodes and in the z time period if and only if the time period . Once the time period elapses, this node cannot achieve authentication to other nodes for future time. These nodes are constrained by the time period. It could decrease the risk of the entire sensor network. The proposed method could protect all future secret information and the security of the entire sensor network will not be revealed. Thus, it could provide more secure connectivity for sensor networks.
3.1.7. Perfect Forward Secrecy
According to the Diffie-Hellman algorithm over elliptic curve, it provides that over elliptic curve . Hence, only two nodes and can obtain their common shared key by using their secret parameter and , respectively. This common shared key is pairwise. Therefore, by means of the signature verification, any pair of nodes and can mutually authenticate each other and construct a shared session key for securing communications. Thus, the proposed scheme can prevent external adversaries from eavesdropping normal messages or injecting bogus data into the sensor network. For security and creating a different session key for nodes and , the random numbers and should be used only once. Then, even if an intruder obtains the current session key , it is difficult for him to obtain private messages from the past. The new scheme can provide perfect forward security even if the current secret key has been compromised.
3.2. Performance
To the best of our knowledge, most previous key predistribution schemes cannot be easily implemented as a dynamic access control, because all the old secret messages of existing nodes have to be changed once a new sensor node is added [4–8, 15]. Therefore, with regard to efficiency and communications, we compare the proposed protocol with Zhou et al.'s [11] which is an access control scheme based on ECC. For convenience, we define related notations to analyze the computational complexity. The notation means the time for one multiplication computation over an elliptic curve, denotes the time for one modular inverse computation, and denotes the time for executing the adopted one-way hash function in one's scheme. Note that the times for computing modular addition is ignored, since they are much smaller than , , and .
In the proposed method and Zhou et al.'s protocol, the most expensive operation is the point multiplication of the form for and P is a cyclic group of points over an elliptic curve [17–19]. Zhou et al. [11] and Gura et al. [26] evaluated the assembly language implementations of ECC and RSA on the Atmel ATmega128 processor [26, 27], which is popular for sensor platform such as crossbow MICA motes. In their implementation, a 160-bit point multiplication of ECC requires only 0.81 s (second), while 1024-bit RSA public key operation and private key operation require about 0.43 s (second) and 10.99 s (second), respectively. Besides, an inverse computation in takes about the same time as that of a modular exponentiation computation in [28, 29]. And a hashing computation is more efficient than and [28, 29]. Therefore, under the same security level, smaller key sizes of ECC could offer faster computation, as well as memory, energy, and bandwidth savings.
We summarize the comparisons of the proposed scheme with Zhou et al.'s scheme in Table 1. As shown in Table 1, in Zhou et al.'s scheme [11], each node needs to perform two hash function computations (), two inverse modular computations (), and four-point multiplications () over an elliptic curve for authentication. In the proposed method, each node requires two hash function computations () and five-point multiplications () over an elliptic curve for authentication. In the implementation of [9, 27] for sensor platform, a 160-bit point multiplication of ECC requires only 0.81 s. Under their implementation [9, 27], the time to perform the proposed scheme is 4.05 s () for the five-point multiplications () over an elliptic curve. The time for Zhou et al.'s scheme is 3.24 s () for the four-point multiplications (). Moreover, in Zhou et al.'s scheme, each node needs to use two inverse modular computations (). However, the proposed method need not to use inverse modular computations. As reported in [28, 29], an inverse computation in takes about the same time as that of a modular exponentiation computation in . Therefore, the computational time of the Zhou et al.'s scheme is not significantly less than that of the proposed scheme.
Comparisons of computation and transmission for two schemes.
Schemes
Zhou et al.'s scheme
The proposed scheme
Computations for each node to achieve authentication and compute a common key
Total number of transmissions for the protocol
21
10
With regard to the communications, in the proposed authentication and key establishment phase, for the node , it requires to send five messages, , and , to the node ; similarly, the node needs to deliver five messages, , and , to the node . The total number of transmissions for the proposed protocol only needs ten transmissions. However, it is required to send twenty-one transmissions in Zhou et al.'s protocol [11]. Compared to Zhou et al.'s scheme, the proposed method could significantly reduce the overhead of communications for sensor nodes to achieve secure connectivity. Therefore, under the same security level, the proposed method could offer more energy and bandwidth savings than Zhou et al.'s scheme.
4. Conclusions
Based on ECC, this paper presents a simple dynamic access control protocol to prevent malicious nodes from joining sensor networks. Compared to the previously proposed schemes, the authentication procedure and common key generation of the proposed method are very simple and efficient. The proposed method could significantly reduce the overhead by avoiding modular exponentiation and inverse computations for any pair of nodes to establish a common key in the authentication procedure. It could offer computational efficiency, energy, and bandwidth savings.
Footnotes
Acknowledgment
The authors wish to thank many anonymous referees for their suggestions to improve this paper.
References
1.
AkyildizI. F.SuW.SankarasubramaniamY.CayirciE.A survey on sensor networksIEEE Communications Magazine20024081021142-s2.0-003668807410.1109/MCOM.2002.1024422
2.
Rodriguez-MozazS.AldaM. J. L. D.MarcoM. P.BarcelóD.Biosensors for environmental monitoring: a global perspectiveTalanta20056522912972-s2.0-854428000310.1016/j.talanta.2004.07.006
3.
LiuD.NingP.Establishing pairwise keys in distributed sensor networksProceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)October 200352612-s2.0-3042822764
4.
ChanH.PerrigA.SongD.Random key predistribution schemes for sensor networksProceedings of IEEE Symposium on Security and PrivacyMay 20031972132-s2.0-0038487088
5.
ChoiS. J.YounH. Y.An efficient key pre-distribution scheme for secure distributed sensor networksProceedings of the IFIP International Conference on Embedded and Ubiquitous Computing (EUC '05)December 20051088109710.1007/11596042_111
6.
EschenauerL.GligorV. D.A key-management scheme for distributed sensor networksProceedings of the 9th ACM Conference on Computer and Communications SecurityNovember 200241472-s2.0-0038341106
7.
HuangH. F.A new design of efficient key pre-distribution scheme for secure wireless sensor networksProceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '07)Novemebr 2007Kaohsiung, Taiwan253256
8.
ParkC. W.ChoiS. J.YounH. Y.A novel key pre-distribution scheme with LU matrix for secure wireless sensor networksProceedings of the International Conference on Computational Intelligence and Security (CIS '05)December 2005Springer494499
9.
HuY. C.PerrigA.JohnsonD. B.Packet leashes: a defense against wormhole attacks in wireless networksProceeding of the 22nd Annual Joint Conference on the IEEE Computer and Communications SocietiesApril 2003197619862-s2.0-0041973497
10.
ParnoB.PerrigA.GligorV.Distributed detection of node replication attacks in sensor networksProveedings of IEEE Symposium on Security and PrivacyMay 200549632-s2.0-27544460282
11.
ZhouY.ZhangY.FangY.Access control in wireless sensor networksAd Hoc Networks20075131310.1016/j.adhoc.2006.05.014
12.
ZhuS.SetiaS.JajodiaS.LEAP: efficient security mechanisms for large-scale distributed sensor networksProceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)October 200362722-s2.0-10044284351
13.
ZhuS.SetiaS.JajodiaS.LEAP+: efficient security mechanisms for large-scale distributed sensor networksACM Transactions on Sensor Networks2006245005282-s2.0-3384712037710.1145/1218556.1218559
14.
WangH.ShengB.TanC. C.LiQ.Comparing symmetric-key and public-key based security schemes in sensor networks: a case study of user access controlProceedings of the 28th International Conference on Distributed Computing Systems (ICDCS '08)July 2008Beijing, China1810.1109/ICDCS.2008.77
15.
ShamirA.How to share a secretCommunications of the ACM197922116126132-s2.0-001854544910.1145/359168.359176
16.
RivestR. L.ShamirA.AdlemanL.A method for obtaining digital signatures and public key cryptosystemsCommunications of the ACM19782121201262-s2.0-001793080910.1145/359340.359342
17.
KoblitzN.Elliptic curve cryptosystemsMathematics of Computation198748203209
18.
MillerV.Uses of elliptic curves in cryptography218Advances in Cryptology (CPYPTO '85)1986Springer417426Lecture Notes in Computer Science
19.
VanstoneS.Responses to NIST's proposalCommunications of the ACM1992355052
SchnorrC. P.Efficient identification and signatures for smart cards435Advances in Cryptology (Crypto '89)1990Springer339351Lecture Notes in Computer Science
22.
KumanduriR.Number Theory with Computer Applications1998Upper Saddle River, NJ, USAPrentice Hall
23.
DiffieW.HellmanM. E.New directions in cryptologyIEEE Transactions on Information Theory19762266446542-s2.0-0017018484
24.
DouceurJ. R.The Sybil attackProceedings of the 1st International Workshop on Peer-to-peer Systems (IPTPS '02)March 2002
25.
WangW.BhargavaB.Visualization of wormholes in sensor networksProceedings of the ACM Workshop on Wireless Security (WiSe '04)October 2004Philadelphia, Pa, USA51602-s2.0-11244309139
26.
GuraN.PatelA.WanderA.EberleH.ShantzS. C.Comparing elliptic curve cryptography and RSA on 8-Bit CPUsProceedings of the 6th International Workshop Cryptographic Hardware and Embedded Systems (CHES '04)20041191322-s2.0-35048818581
DimitrovV.CooklevT.Two algorithms for modular exponentiation using nonstandard arithmeticsIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences1995E78-A182872-s2.0-0029223753
29.
FanC. I.LeiC. L.Low-computation partially blind signatures for electronic cashIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences1998E81-A58188242-s2.0-0032066059