User menu

Fast hash-based signatures on constrained devices

Bibliographic reference Rohde, S. ; Eiscnbarth, T. ; Dahmen, E. ; Buchmann, Jean ; Paar, C.. Fast hash-based signatures on constrained devices.Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008 (London, UK, 8-11 September 2008). In: Grimaud, G.; Standaert, F.-X.;, Smart Card Research and Advanced Applications. 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, Springer-verlag2008, p. 104-117
Permanent URL
  1. Rijndaelfurious implementation (January 2008),
  2. Atmel. Overview of secure avr microcontrollers 8-/16-bit risc cpu (2007),
  3. Atmel. Specifications of the atmega128 microcontroller (2007),
  4. Buchmann Johannes, García Luis Carlos Coronado, Dahmen Erik, Döring Martin, Klintsevich Elena, CMSS – An Improved Merkle Signature Scheme, Progress in Cryptology - INDOCRYPT 2006 (2006) ISBN:9783540497677 p.349-363, 10.1007/11941378_25
  5. Buchmann Johannes, Dahmen Erik, Klintsevich Elena, Okeya Katsuyuki, Vuillaume Camille, Merkle Signatures with Virtually Unlimited Signature Capacity, Applied Cryptography and Network Security ISBN:9783540727378 p.31-45, 10.1007/978-3-540-72738-5_3
  6. Buchmann, J., Dahmen, E., Schneider, M.: Merkle tree traversal revisited (manuscript, 2008),
  7. Cheng, X., Li, W., Znati, T. (eds.): WASA 2006. LNCS, vol. 4138. Springer, Heidelberg (2006)
  8. Coronado, C.: On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive, Report 2005/192 (2005),
  9. Dods C., Smart N. P., Stam M., Hash Based Digital Signature Schemes, Cryptography and Coding (2005) ISBN:9783540302766 p.96-115, 10.1007/11586821_8
  10. Driessen Benedikt, Poschmann Axel, Paar Christof, Comparison of innovative signature algorithms for WSNs, 10.1145/1352533.1352539
  11. Belgian electronic ID card officially launched (April 2003),
  12. Digital signature standard (DSS). FIPS PUB 186-2 (2007),
  13. Ganesan Prasanth, Venugopalan Ramnath, Peddabachagari Pushkin, Dean Alexander, Mueller Frank, Sichitiu Mihail, Analyzing and modeling encryption overhead for sensor network nodes, 10.1145/941350.941372
  14. Gura Nils, Patel Arun, Wander Arvinderpal, Eberle Hans, Shantz Sheueling Chang, Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs, Lecture Notes in Computer Science (2004) ISBN:9783540226666 p.119-132, 10.1007/978-3-540-28632-5_9
  15. Labor, D.: Crypto-avr-lib (January 2008),
  16. Lenstra, A.K.: Key lengths. Contribution to The Handbook of Information Security (2004),
  17. Liu, A., Ning, P.: TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks. Technical Report TR-2007-36, North Carolina State University, Department of Computer Science (November 2007)
  18. Luk Mark, Perrig Adrian, Whillock Bram, Seven cardinal properties of sensor network broadcast authentication, 10.1145/1180345.1180364
  19. Menezes Alfred, van Oorschot Paul, Vanstone Scott, Handbook of Applied Cryptography, ISBN:9780849385230, 10.1201/9781439821916
  20. Merkle Ralph C., A Certified Digital Signature, Advances in Cryptology — CRYPTO’ 89 Proceedings ISBN:9780387973173 p.218-238, 10.1007/0-387-34805-0_21
  21. Naor, D., Shenhav, A., Wool, A.: One-time signatures revisited: Have they become practical. Cryptology ePrint Archive, Report 2005/442 (2005),
  22. Steinberger John P., The Collision Intractability of MDC-2 in the Ideal-Cipher Model, Advances in Cryptology - EUROCRYPT 2007 (2007) ISBN:9783540725398 p.34-51, 10.1007/978-3-540-72540-4_3
  23. Viega, J.: The AHASH Mode of Operation (manuscript, 2004),
  24. Yu-long SHEN, Jian-feng MA, Qing-qi PEI, An Access Control Scheme in Wireless Sensor Networks, 10.1109/npc.2007.99