2015
DOI: 10.1002/sec.1254
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of twisted Edwards‐form elliptic curve cryptography for wireless sensor nodes

Abstract: Wireless sensor networks (WSNs) pose a number of unique security challenges that demand innovation in several areas including the design of cryptographic primitives and protocols. Despite recent progress, the efficient implementation of Elliptic Curve Cryptography (ECC) for WSNs is still a very active research topic, and techniques to further reduce the time and energy cost of ECC are eagerly sought. This paper presents an optimized ECC implementation that we developed from scratch to comply with the severe re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Edwards' curves are known to offer better performances among all Elliptic Curve (EC) families [21]. The Curve25519 was introduced as an ECDH (Elliptic Curve Diffie-Hellman) function but it is known today as the underlying elliptic curve designed for use with ECDH key agreement scheme (X25519) or with ECDSA (Elliptic Curve Digital Signature Algorithm) signature (Ed25519).…”
Section: Parametersmentioning
confidence: 99%
“…Edwards' curves are known to offer better performances among all Elliptic Curve (EC) families [21]. The Curve25519 was introduced as an ECDH (Elliptic Curve Diffie-Hellman) function but it is known today as the underlying elliptic curve designed for use with ECDH key agreement scheme (X25519) or with ECDSA (Elliptic Curve Digital Signature Algorithm) signature (Ed25519).…”
Section: Parametersmentioning
confidence: 99%
“…For this reason, these traditional PKC protocols have been widely deployed, such as SSL, TLS, and HTTPS. Since the PKC protocols are more expensive than symmetric key cryptography, many previous works focused on high-performance and compact implementations of PKC algorithms (e.g., RSA and ECC) on various platforms [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Credentials' randomizations, selective disclosure and unlinkability features are very interesting results that contribute in guaranteeing non traceability. Edwards curves, known as the curves in which cryptographic calculations are faster [18], are privileged. We then win in memory usage, performance in computing time and bandwidth usage.…”
Section: Introductionmentioning
confidence: 99%