Sheueling Chang Shantz

According to our database1, Sheueling Chang Shantz authored at least 17 papers between 2001 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
A cryptographic processor for arbitrary elliptic curves over GF(2<sup>m</sup>).
Int. J. Embed. Syst., 2008

Multi-Factor Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2008

2005
Sizzle: A standards-based end-to-end security architecture for the embedded Internet.
Pervasive Mob. Comput., 2005

Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs.
IEEE Micro, 2005

Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks.
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper).
Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications (PerCom 2005), 2005

Architectural Extensions for Elliptic Curve Cryptography over GF(2<sup>m</sup>) on 8-bit Microprocessors.
Proceedings of the 16th IEEE International Conference on Application-Specific Systems, 2005

2004
Integrating elliptic curve cryptography into the web's security infrastructure.
Proceedings of the 13th international conference on World Wide Web, 2004

Speeding up Secure Web Transactions Using Elliptic Curve Cryptography.
Proceedings of the Network and Distributed System Security Symposium, 2004

Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

A Public-Key Cryptographic Processor for RSA and ECC.
Proceedings of the 15th IEEE International Conference on Application-Specific Systems, 2004

2003
A Cryptograhpic Processor for Arbitrary Elliptic Curves over.
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003

Generic GF(2) Arithmetic in Software and Its Application to ECC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Performance analysis of elliptic curve cryptography for SSL.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

An End-to-End Systems Approach to Elliptic Curve Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

Generic implementations of elliptic curve cryptography using partial reduction.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Elliptic Curve Cryptography on a Palm OS Device.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001


  Loading...