### Citations

3891 | A method for obtaining digital signatures and public-key cryptosystems,”
- Rivest, Shamir, et al.
- 1978
(Show Context)
Citation Context ...s needs to be established, before actual communication commences. This is impossible in many practical signing applications. As a result, Public Key cryptographic algorithms are used, such as the RSA =-=[47]-=-, based on multiplication of large integers, the DSA [38] based on modular exponentiation and the ECDSA [7] based on scalar multiplication of elliptic curve points. The mathematical theory behind elli... |

57 | RFID Guardian: A Battery-powered Mobile Device for RFID Privacy Management”,
- Rieback, Crispo, et al.
- 2005
(Show Context)
Citation Context ...thorized readers’ requests. In this context, a platform for testing such functionality was developed and is presented in this thesis. The platform was developed to be used by the RFID Guardian system =-=[46]-=-. It concerns a battery-powered device, integratable into Personal Digital Assistants (PDA) or mobile phones, which is carried by users to manage the security and privacy against threats that attempt ... |

51 |
Low-energy digit-serial/parallel finite field multipliers.
- Song, Parhi
- 1998
(Show Context)
Citation Context ...utation time of such algorithms is spent on multiplication and therefore designers focus on optimizing this first. This is confirmed also by the number of research papers treating this topic, such as =-=[49]-=-, [18], [32] etc. Multiplier implementations come in two flavors; fully parallel multipliers process whole operands in a single cycle and digit-serial multipliers process operands in more cycles, cons... |

22 |
Is Elliptic-Curve Cryptography Suitable for Small Devices
- Wolkerstorfer
(Show Context)
Citation Context ...n a variety of applications. In this case the instantaneous power must be controlled, making the design of such a system even more challenging. A limit of ∼ 50µW is mentioned in most relevant designs =-=[12, 53, 30]-=-. Increased chip area leads to increased manufacturing costs for the device, and one of 43 44 CHAPTER 4. ELLIPTICCORE IMPLEMENTATION the attributes advertised by RFID system manufacturers is the very ... |

9 |
Long and fast up/down counters,”
- Stan, Tenca, et al.
- 1998
(Show Context)
Citation Context ... The dotted line represents this relationship when the tag supply voltage can be 3V and the solid line represents a supply voltage of 5V. Current consumption in the range [1, 10] µA (corresponding to =-=[5, 50]-=- µW for 5V supply voltage) does not affect the energy range. Beyond this limit, the energy range deteriorates fast. For minimal power consumption, the energy range is [1, 1.5] meters for typical tags ... |

7 |
Hardware aspects of elliptic curve cryptography
- Wolkerstorfer
- 2004
(Show Context)
Citation Context ...idered. ECDSA contains a large number of elementary finite field operations which lead to complex control structures. A designer might opt for a small-footprint microprocessor core, as is the case in =-=[52]-=-. A complex control unit is more difficult to optimize for area or power consumption and wasteful switching activity will almost certainly take place. On the other hand, a hierarchical approach offers... |

1 |
Dutch RFID e-passport cracked
- Ricker
(Show Context)
Citation Context ...ntaining personal information such as name, date of birth and a digitized version of the passport photograph [20]. However, research groups have managed to reproduce passport data and clone passports =-=[45]-=- and thus point out another possible security threat related to RFID technology. In order to satisfy the authentication, integrity and non-repudiation security objectives of Section 1.2, digital signa... |

1 |
SA605 : High Performance low power mixer FM IF system
- Semiconductors
- 1997
(Show Context)
Citation Context ...agraphs, the tag receiver is essentially an amplitude demodulator, a circuit well known to analog designers. The tag receiver’s design (Figure 2.8) is based on the SA605 FM mixer system from Philips (=-=[48]-=-), configured as an ASK demodulator. The chip itself contains a mixer/oscillator, two limiting Intermediate Frequency (IF) amplifiers, a logarithmic Received Signal Strength Indicator (RSSI) and a vol... |