2018 IEEE Conference on Communications and Network Security (CNS) 2018
DOI: 10.1109/cns.2018.8433134
|View full text |Cite
|
Sign up to set email alerts
|

Compact Energy and Delay-Aware Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Therefore, we believe ARIS can be an ideal alternative for real-time applications. ARIS signature size is the same with its EC-based counterparts [23], [15], [14], [7] , that is significantly lower than its RSA-based and hash-based counterparts [24], [13], [11]. On the other hand, ARIS comes with a larger private and public key, that is 32 KB.…”
Section: ) Experimental Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, we believe ARIS can be an ideal alternative for real-time applications. ARIS signature size is the same with its EC-based counterparts [23], [15], [14], [7] , that is significantly lower than its RSA-based and hash-based counterparts [24], [13], [11]. On the other hand, ARIS comes with a larger private and public key, that is 32 KB.…”
Section: ) Experimental Resultsmentioning
confidence: 99%
“…Note that we only compare ARIS with its EC-based counterparts, due to their communication and storage efficiency. Moreover, resource-contrained processors such as ATmega 2560 may not be suitable for heavy computations (e.g., exponentiation with 3072-bit numbers in RSA [24] and CEDA [13]).…”
Section: ) Experimental Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Some MAC based alternatives (e.g., TESLA [28], [29]) use time asymmetries to offer computational efficient and compactness, they cannot offer non-repudiation and require a continuous time synchronization. EC-based digital signatures (e.g., [11], [13], [24], [30], [31], [32]) are currently the most prevalent alternatives to be used on embedded devices due to their compact size and higher signing efficiency compared to RSA-based signatures (e.g., CEDA [33]). We provided a detailed performance comparison of ESEM with its most recent EC-based alternatives in Section V.…”
Section: Related Workmentioning
confidence: 99%