A scalar multiplication over a binary elliptic curve consists in a sequence of hundreds of multiplications, squarings and additions. This sequence of field operations often involves a large amount ofâ€¦ (More)

In most networks, it is simple to find the identity of participants communicating with each other or to link packet flows together. Our objective is to develop a proactive routing protocol for ad hocâ€¦ (More)

An ecological interface (EI) consists in a user interface (UI) displaying the constraints of a specific environment in order to support a userâ€™s decision-making process. The design gap problem can beâ€¦ (More)

We present two new strategies for parallel implementation of scalar multiplication over elliptic curves. We first introduce a Montgomery-halving algorithm which is a variation of the originalâ€¦ (More)

8th IFIP Annual Mediterranean Ad Hoc Networkingâ€¦

2009

Wormhole attacks in ad-hoc networks have been attracting much attention over the years. They consist in two malicious nodes tunneling traffic from one end of the network to the other. Severalâ€¦ (More)

Digital Signature Algorithm (DSA) involves modular exponentiation, of a public and known base by a random one-time exponent. In order to speed-up this operation, well-known methods take advantage ofâ€¦ (More)

Digital signature algorithm (DSA) (resp. ECDSA) involves modular exponentiation (resp. scalar multiplication) of a public and known base by a random one-time exponent. In order to speed up thisâ€¦ (More)