2007 IEEE International Conference on Portable Information Devices 2007
DOI: 10.1109/portable.2007.47
|View full text |Cite
|
Sign up to set email alerts
|

Computing Cryptographic Algorithms in Portable and Embedded Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
1
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 42 publications
(14 citation statements)
references
References 3 publications
0
12
1
1
Order By: Relevance
“…In the implementation two libraries were used as tools to perform mathematical operations: MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) due to its application in other papers (Ramachandran et al, 2007), and RELIC 0.2.3 (Library for Efficient Cryptography) (Relic, 2011). The MIR-ACL library produced by Shamus Software is proprietary, but free for educational use.…”
Section: Elliptic Curve Cryptography (Ecc) and Developed Algorithmsmentioning
confidence: 99%
“…In the implementation two libraries were used as tools to perform mathematical operations: MIRACL (Multiprecision Integer and Rational Arithmetic C/C++ Library) due to its application in other papers (Ramachandran et al, 2007), and RELIC 0.2.3 (Library for Efficient Cryptography) (Relic, 2011). The MIR-ACL library produced by Shamus Software is proprietary, but free for educational use.…”
Section: Elliptic Curve Cryptography (Ecc) and Developed Algorithmsmentioning
confidence: 99%
“…In ACP scheme, the author reports that the encryption needs O(N 2 ) finite field operations when the sub-group size if N ; in the BGW scheme, the encryption and decryption require O(N ) operations on the bilinear group, which are heavier than finite field operations [18,30]. In ABBE, each encryption requires log N operations on the G 0 , and the decryption requires 2 log N +1 pairings and log N (log N −1)+log N operations on G 0 and log N operations on G 1 .…”
Section: Computation Overheadmentioning
confidence: 99%
“…In [3] and [4] some temporal benchmarking tests are executed in PDAs of similar characteristics than ours. The first has a throughput for AES-256 of 149.5 KBps, and the second 1382.7 KBps.…”
Section: Symmetric Algorithmsmentioning
confidence: 99%
“…Our results are much better, 4761.9 KBps. We impute the differences with [3] to the algorithms implementation (we use plain C instead of C#), and with [4] to the fact that they tested the cipher with very small input data (128 bits) so the operational costs of the initialization are not amortized. Finally, we compare the results with [1] that used an optimized self implementation library of AES.…”
Section: Symmetric Algorithmsmentioning
confidence: 99%