{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:45:21Z","timestamp":1725860721667},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319402529"},{"type":"electronic","value":"9783319402536"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40253-6_6","type":"book-chapter","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T19:00:31Z","timestamp":1467226831000},"page":"94-112","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes"],"prefix":"10.1007","author":[{"given":"Zhe","family":"Liu","sequence":"first","affiliation":[]},{"given":"Johann","family":"Gro\u00dfsch\u00e4dl","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qiuliang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,30]]},"reference":[{"issue":"8","key":"6_CR1","doi-asserted-by":"publisher","first-page":"19560","DOI":"10.3390\/s150819560","volume":"15","author":"O Alfandi","year":"2015","unstructured":"Alfandi, O., Bochem, A., Kellner, A., G\u00f6ge, C., Hogrefe, D.: Secure and authenticated data communication in wireless sensor networks. Sensors 15(8), 19560\u201319582 (2015)","journal-title":"Sensors"},{"key":"6_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/11745853_14","volume-title":"Public Key Cryptography - PKC 2006","author":"DJ Bernstein","year":"2006","unstructured":"Bernstein, D.J.: Curve25519: new Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207\u2013228. Springer, Heidelberg (2006)"},{"key":"6_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-540-68164-9_26","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2008","author":"DJ Bernstein","year":"2008","unstructured":"Bernstein, D.J., Birkner, P., Joye, M., Lange, T., Peters, C.: Twisted Edwards curves. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 389\u2013405. Springer, Heidelberg (2008)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Bormann, C., Ersue, M., Keranen, A.: Terminology for Constrained-Node Networks. Internet Engineering Task Force, Light-Weight Implementation Guidance Working Group, RFC 7228, May 2014","DOI":"10.17487\/rfc7228"},{"key":"6_CR5","unstructured":"Dang, D., Plant, M., Poole, M.: Wireless connectivity for the Internet of Things (IoT) with MSP430 microcontrollers (MCUs), March 2014. Texas Instruments white paper, http:\/\/www.ti.com\/lit\/wp\/slay028\/slay028.pdf"},{"issue":"2\u20133","key":"6_CR6","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10623-015-0087-1","volume":"77","author":"M D\u00fcll","year":"2015","unstructured":"D\u00fcll, M., Haase, B., Hinterw\u00e4lder, G., Hutter, M., Paar, C., S\u00e1nchez, A.H., Schwabe, P.: High-speed Curve25519 on 8-bit, 16-bit and 32-bit microcontrollers. Des. Codes Crypt. 77(2\u20133), 493\u2013514 (2015)","journal-title":"Des. Codes Crypt."},{"key":"6_CR7","unstructured":"Evans, D.: The Internet of things: how the next evolution of the Internetis changing everything, April 2011. Cisco IBSG white paper, http:\/\/www.cisco.com\/web\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1016\/j.adhoc.2011.06.015","volume":"10","author":"X Fan","year":"2012","unstructured":"Fan, X., Gong, G.: Accelerating signature-based broadcast authentication for wireless sensor networks. Ad Hoc Netw. 10(4), 723\u2013736 (2012)","journal-title":"Ad Hoc Netw."},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-10628-6_17","volume-title":"Progress in Cryptology - INDOCRYPT 2009","author":"CPL Gouv\u00eaa","year":"2009","unstructured":"Gouv\u00eaa, C.P.L., L\u00f3pez, J.: Software implementation of pairing-based cryptography on sensor networks using the MSP430 microcontroller. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 248\u2013262. Springer, Heidelberg (2009)"},{"key":"6_CR10","unstructured":"Gro\u00dfsch\u00e4dl, J.: A family of implementation-friendly MoTE elliptic curves. Technical report TR-LACS-2013-01, Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg, Luxembourg (2013)"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.pmcj.2005.08.005","volume":"1","author":"V Gupta","year":"2005","unstructured":"Gupta, V., Wurm, M., Zhu, Y., Millard, M., Fung, S., Gura, N., Eberle, H., Chang Shantz, S.: Sizzle: a standards-based end-to-end security architecture for the embedded Internet. Pervasive Mob. Comput. 1(4), 425\u2013445 (2005)","journal-title":"Pervasive Mob. Comput."},{"key":"6_CR12","volume-title":"Guide to Elliptic Curve Cryptography","author":"DR Hankerson","year":"2004","unstructured":"Hankerson, D.R., Menezes, A.J., Vanstone, S.A.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11277-011-0385-5","volume":"61","author":"T Heer","year":"2011","unstructured":"Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S., Wehrle, K.: Security challenges in the IP-based Internet of things. Wireless Pers. Commun. 61(3), 527\u2013542 (2011)","journal-title":"Wireless Pers. Commun."},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-319-16295-9_2","volume-title":"Progress in Cryptology - LATINCRYPT 2014","author":"G Hinterw\u00e4lder","year":"2015","unstructured":"Hinterw\u00e4lder, G., Moradi, A., Hutter, M., Schwabe, P., Paar, C.: Full-size high-security ECC implementation on MSP430 microcontrollers. In: Aranha, D.F., Menezes, A. (eds.) LATINCRYPT 2014. LNCS, vol. 8895, pp. 31\u201347. Springer, Heidelberg (2015)"},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-540-89255-7_20","volume-title":"Advances in Cryptology - ASIACRYPT 2008","author":"H Hisil","year":"2008","unstructured":"Hisil, H., Wong, K.K.-H., Carter, G., Dawson, E.: Twisted Edwards curves revisited. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 326\u2013343. Springer, Heidelberg (2008)"},{"key":"6_CR16","unstructured":"Kar, S.: Cisco says Internet of things will have ten times more impact onsociety than Internet, March 2014. Cloud Times, http:\/\/cloudtimes.org\/2014\/03\/07\/cisco-says-internet-of-things-will-have-ten-times-more-impact-on-society-than-internet"},{"issue":"7","key":"6_CR17","first-page":"595","volume":"7","author":"AA Karatsuba","year":"1963","unstructured":"Karatsuba, A.A., Ofman, Y.P.: Multiplication of multidigit numbers on automata. Soviet Physics - Doklady 7(7), 595\u2013596 (1963)","journal-title":"Soviet Physics - Doklady"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/3-540-68697-5_9","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"PC Kocher","year":"1996","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104\u2013113. Springer, Heidelberg (1996)"},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-319-21966-0_12","volume-title":"Information and Communications Security","author":"Z Liu","year":"2015","unstructured":"Liu, Z., Seo, H., Gro\u00dfsch\u00e4dl, J., Kim, H.: Reverse product-scanning multiplication and squaring on 8-bit AVR processors. In: Hui, L.C.K., Qing, S.H., Shi, E., Yiu, S.M. (eds.) ICICS 2015. LNCS, vol. 8958, pp. 158\u2013175. Springer, Heidelberg (2015)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Z., Seo, H., Hu, Z., Huang, X., Gro\u00dfsch\u00e4dl, J.: Efficient implementation of ECDH key exchange for MSP430-based wireless sensor networks. In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), pp. 145\u2013153. ACM Press (2015)","DOI":"10.1145\/2714576.2714608"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-319-07536-5_22","volume-title":"Applied Cryptography and Network Security","author":"Z Liu","year":"2014","unstructured":"Liu, Z., Wenger, E., Gro\u00dfsch\u00e4dl, J.: MoTE-ECC: energy-scalable elliptic curve cryptography for wireless\u00a0sensor\u00a0networks. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 361\u2013379. Springer, Heidelberg (2014)"},{"key":"6_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-23300-5_16","volume-title":"Availability, Reliability and Security for Business, Enterprise and Health Information Systems","author":"L Marin","year":"2011","unstructured":"Marin, L., Jara, A.J., Skarmeta, A.F.G.: Shifting primes: extension of pseudo-mersenne primes to optimize ECC for MSP430-based future Internet of Things devices. In: Tjoa, A.M., Quirchmayr, G., You, I., Xu, L. (eds.) ARES 2011. LNCS, vol. 6908, pp. 205\u2013219. Springer, Heidelberg (2011)"},{"key":"6_CR23","unstructured":"Memsic, Inc.: TelosB Mote Platform, March 2007. Data sheet, http:\/\/www.memsic.com\/userfiles\/files\/Datasheets\/WSN\/6020-0094-02_B_TELOSB.pdf"},{"issue":"177","key":"6_CR24","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"6_CR25","unstructured":"Moskowitz, R.G., Hummen, R.: HIP Diet EXchange (DEX). Internet Engineering Task Force, Network Working Group, Internetdraft draft-moskowitz-hip-dex-04 (work in progress), July 2015"},{"key":"6_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/978-3-540-24676-3_16","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Naccache","year":"2004","unstructured":"Naccache, D., Smart, N.P., Stern, J.: Projective coordinates leak. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 257\u2013267. Springer, Heidelberg (2004)"},{"key":"6_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1007\/978-3-642-25286-0_3","volume-title":"RFID","author":"C Pendl","year":"2012","unstructured":"Pendl, C., Pelnar, M., Hutter, M.: Elliptic curve cryptography on the WISP UHF RFID tag. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 32\u201347. Springer, Heidelberg (2012)"},{"key":"6_CR28","doi-asserted-by":"publisher","DOI":"10.1007\/b117506","volume-title":"Wireless Sensor Networks","author":"CS Raghavendra","year":"2004","unstructured":"Raghavendra, C.S., Sivalingam, K.M., Znati, T.F.: Wireless Sensor Networks. Kluwer Academic Publishers, Norwell (2004)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Rescorla, E.K., Modadugu, N.G.: Datagram Transport Layer Security Version 1.2. Internet Engineering Task Force, Network Working Group, RFC 6347, January 2012","DOI":"10.17487\/rfc6347"},{"issue":"2","key":"6_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"12","key":"6_CR31","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1109\/MCOM.2012.6384464","volume":"50","author":"A Sehgal","year":"2012","unstructured":"Sehgal, A., Perelman, V., Kuryla, S., Sch\u00f6nw\u00e4lder, J.: Management of resource constrained devices in the Internet of things. IEEE Commun. Mag. 50(12), 144\u2013149 (2012)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"6_CR32","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1002\/sec.422","volume":"6","author":"H Seo","year":"2013","unstructured":"Seo, H., Shim, K.-A., Kim, H.: Performance enhancement of TinyECC based on multiplication optimizations. Secur. Commun. Netw. 6(2), 151\u2013160 (2013)","journal-title":"Secur. Commun. Netw."},{"key":"6_CR33","unstructured":"Sinha, A.: Energy Efficient Operating Systems and Software. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2001)"},{"volume-title":"Wirelessly Powered Sensor Networks and Computational RFID","year":"2013","key":"6_CR34","unstructured":"Smith, J.R. (ed.): Wirelessly Powered Sensor Networks and Computational RFID. Springer, New York (2013)"},{"key":"6_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/978-3-540-68914-0_28","volume-title":"Applied Cryptography and Network Security","author":"F Stajano","year":"2008","unstructured":"Stajano, F., Cvrcek, D., Lewis, M.: Steel, cast iron and concrete: security engineering for real world wireless sensor networks. In: Bellovin, S.M., Gennaro, R., Keromytis, A.D., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 460\u2013478. Springer, Heidelberg (2008)"},{"key":"6_CR36","unstructured":"Texas Instruments, Inc.: MSP430x1xx Family User\u2019s Guide (Rev. F), February 2006. Manual, http:\/\/www.ti.com\/lit\/ug\/slau049f\/slau049f.pdf"},{"key":"6_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/978-3-642-27257-8_11","volume-title":"Smart Card Research and Advanced Applications","author":"E Wenger","year":"2011","unstructured":"Wenger, E., Werner, M.: Evaluating 16-bit processors for elliptic curve cryptography. In: Prouff, E. (ed.) CARDIS 2011. LNCS, vol. 7079, pp. 166\u2013181. Springer, Heidelberg (2011)"},{"issue":"1","key":"6_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.adhoc.2006.05.014","volume":"5","author":"Y Zhou","year":"2007","unstructured":"Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Ad Hoc Netw. 5(1), 3\u201313 (2007)","journal-title":"Ad Hoc Netw."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40253-6_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,15]],"date-time":"2020-12-15T04:47:06Z","timestamp":1608007626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40253-6_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319402529","9783319402536"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40253-6_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"30 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}