Implementing Identity-based Key Agreement in Embedded Devices.
Giovanni SchmidFrancesco RossiPublished in: PECCS (2015)
Keyphrases
- embedded devices
- key agreement
- key distribution
- diffie hellman
- embedded systems
- security protocols
- key management
- security properties
- secret key
- mobile devices
- elliptic curve
- signature scheme
- key agreement protocol
- encryption scheme
- limited memory
- provably secure
- data storage
- ciphertext
- authentication scheme
- mobile commerce
- standard model
- flash memory
- public key
- fault tolerant
- security requirements
- resource constrained
- low cost