Sciweavers

37 search results - page 4 / 8
» Fast algorithms for computing isogenies between elliptic cur...
Sort
View
DCC
2000
IEEE
13 years 7 months ago
Efficient Arithmetic on Koblitz Curves
It has become increasingly common to implement discrete-logarithm based public-key protocols on elliptic curves over finite fields. The basic operation is scalar multiplication: ta...
Jerome A. Solinas
ARITH
2007
IEEE
14 years 1 months ago
Fast Modular Reduction
It is widely acknowledged that efficient modular multiplication is a key to high-performance implementation of public-key cryptography, be it classical RSA, Diffie-Hellman, or (hy...
William Hasenplaugh, Gunnar Gaubatz, Vinodh Gopal
MICCAI
2005
Springer
14 years 8 months ago
Using the Fast Marching Method to Extract Curves with Given Global Properties
Abstract. Curves are often used as anatomical features to match surfaces that represent biological objects, such as the human brain. Automated and semi-automated methods for extrac...
Xiaodong Tao, Christos Davatzikos, Jerry L. Prince
WIMOB
2008
IEEE
14 years 1 months ago
On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks
Energy is a central concern in the deployment of wireless sensor networks. In this paper, we investigate the energy cost of cryptographic protocols, both from a communication and ...
Giacomo de Meulenaer, François Gosset, Fran...
PERCOM
2005
ACM
14 years 7 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...