A Practical Performance Comparison of ECC and RSA for Resource-Constrained IoT Devices.
Manuel Suárez-AlbelaTiago M. Fernández-CaramésPaula Fraga-LamasLuis CastedoPublished in: GIoTS (2018)
Keyphrases
- resource constrained
- key management
- elliptic curve
- sensor networks
- elliptic curve cryptography
- embedded systems
- resource constraints
- wireless sensor networks
- security mechanisms
- visual sensor networks
- public key
- rfid tags
- resource limitations
- authentication scheme
- public key cryptography
- modular exponentiation
- search algorithm
- global optimization
- digital watermark
- end to end
- leader follower