Details

Title

Implementation and Analysis of Elliptic Curves-Based Cryptographic Algorithms in the Integrated Programming Environment

Journal title

International Journal of Electronics and Telecommunications

Yearbook

2011

Volume

vol. 57

Issue

No 3

Authors

Divisions of PAS

Nauki Techniczne

Publisher

Polish Academy of Sciences Committee of Electronics and Telecommunications

Date

2011

Identifier

DOI: 10.2478/v10177-011-0034-7 ; eISSN 2300-1933 (since 2013) ; ISSN 2081-8491 (until 2012)

Source

International Journal of Electronics and Telecommunications; 2011; vol. 57; No 3

References

Winiecki W. (2008), Bezpieczenstwo rozproszonych systemow pomiarowo-sterujacych (rsps), Przeglad Elektrotechniczny, LXXXIV, 220. ; Bilski P. (2010), Multi-core implementation of the symmetric cryptography algorithms in the measurement system, Measurement, 43, 1049, doi.org/10.1016/j.measurement.2010.03.002 ; The basics of ecc. [Online]. Available: <a target="_blank" href='http://www.certicom.com/index.php/the-basics-of-ecc'>http://www.certicom.com/index.php/the-basics-of-ecc</a> ; (1997), Handbook of Applied Cryptography. ; Good T. (2005), Aes on fpga: from the fastest to the smallest, null, 427. ; Schneier B. (1996), Applied Cryptography. ; Mermin D. (2006), Breaking rsa encryption with a quantum computer: Shor's factoring algorithm, Lecture notes on Quantum computation, 481. ; Koblitz N. (1999), Algebraic Aspects of Cryptography. ; Henderson D. (2004), Guide to Elliptic Curve Cryptography. ; E. Barker, W. Barker, W. Burr, W. Polk, and M. Smid, <i>Recommendation for Key Management Part 1: General (Revised)</i>, National Institute of Standards and Technology (NIST) Recommendation for Cryptographic Key Management Standard 800-57, March 2007. [Online]. Available: <a target="_blank" href='http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2Mar08-2007.pdf'>http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57-Part1-revised2Mar08-2007.pdf</a> ; N. S. Agency. Nsa suite b cryptography. [Online]. Available: <a target="_blank" href='http://www.nsa.gov/ia/programs/suitebcryptography/index.shtml'>http://www.nsa.gov/ia/programs/suitebcryptography/index.shtml</a> ; Silberschatz A. (2003), Operating System Concepts. ; Microsoft. How to use queryperformancecounter to time code. [Online]. Available: <a target="_blank" href='http://support.microsoft.com/kb/172338'>http://support.microsoft.com/kb/172338</a> ; Microsoft. Queryperformancefrequency function. [Online]. Available: <a target="_blank" href='http://msdn.microsoft.com/en-us/library/ms644905(VS.85).aspx'>http://msdn.microsoft.com/en-us/library/ms644905(VS.85).aspx</a> ; Bilski P. (null), Time optimization of soft real-time virtual instrument design, IEEE Transactions on Instrumentation and Measurement, 54, 4, 1412, doi.org/10.1109/TIM.2005.851213 ; Lukaszewski R. (2009), Metrologia dzis i jutro, 113.
×