The Experts below are selected from a list of 2283 Experts worldwide ranked by ideXlab platform
Sheuelling Chang Shantz - One of the best experts on this subject based on the ideXlab platform.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, Sheuelling Chang Shantz, N. Gura, Vipul Gupta, Sun Microsystems LaboratoriesAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATmega128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy Analysis ofPublic-Key Cryptography for Wireless Sensor Networks
Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and con-sider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that pub-lic-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications PerCom 2005, 2005Co-Authors: A S Wandert, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored. © 2005 IEEE.
R.m. Nelms - One of the best experts on this subject based on the ideXlab platform.
-
Control of a Single-Phase PFC Preregultaor using an 8-Bit Microcontroller
APEC 07 - Twenty-Second Annual IEEE Applied Power Electronics Conference and Exposition, 2007Co-Authors: Yijing Chen, Dake He, R.m. NelmsAbstract:Presented in this paper is a hybrid power factor correction (PFC) preregulator controlled by a single Microcontroller. By using the on-board peripherals of this Microcontroller, no complex algorithm or external multiplier was required to perform the PFC function correctly, and thus a one-chip solution has been achieved. The proposed hybrid PFC preregulator has been tested in the laboratory. The measured power factor was above 0.99, and the output voltage was precisely controlled. Experimental results also indicate that the hybrid PFC preregulator can operate satisfactorily over a range of input voltages and output loads. The results presented in this paper demonstrate that it is possible to implement a high performance PFC preregulator using a single Microcontroller without more expensive DSPs or other complicated hardware. Because of the simplicity of the circuit, the proposed PFC preregulator has low cost and high reliability.
-
Control ofa Single-PhasePFC Preregultaor usingan 8-Bit Microcontroller
2007Co-Authors: Yijing Chen, R.m. NelmsAbstract:Presented inthispaperisa hybridpowerfactor correction (PFC)preregulator controlled by a single Microcontroller. By usingtheon-board peripherals ofthis Microcontroller, nocomplex algorithm orexternal multiplier was required toperform thePFCfunction correctly, andthusaone- chipsolution hasbeenachieved. Theproposed hybrid PFC preregulator hasbeentested inthelaboratory. Themeasured powerfactor wasabove0.99, andtheoutputvoltage was precisely controlled. Experimental results alsoindicate thatthe hybrid PFCpreregulator canoperate satisfactorily overarange ofinput voltages andoutput loads. Theresults presented inthis paperdemonstrate thatitispossible toimplement a high performance PFC preregulator usinga single Microcontroller without moreexpensive DSPsorothercomplicated hardware. Becauseofthesimplicity ofthecircuit, theproposed PFC preregulator haslowcost andhighreliability.
-
Fuzzy logic peak current-mode control for dc-dc converters using an inexpensive 8-Bit Microcontroller
Twentieth Annual IEEE Applied Power Electronics Conference and Exposition 2005. APEC 2005., 2005Co-Authors: D. He, R.m. NelmsAbstract:Described in this paper are the design and implementation of a Microcontroller-based fuzzy logic peak current-mode controller (PCMC) for dc-dc converters. A fuzzy logic PCMC boost converter operating in the continuous conduction mode has been designed using an 8-Bit Microcontroller. A one-chip solution has been achieved. No complex algorithm is required to estimate the controlled current by using the on-board peripherals of the Microcontroller. The fuzzy logic algorithm uses a rule-based description of converter operation. By using rule-based look-up tables and other techniques, the fuzzy logic algorithm is implemented on the low-cost Microcontroller successfully. Experimental results indicate successful operation of the Microcontroller-based fuzzy logic PCMC power converter system.
-
Average current-mode control for a boost converter using an 8-Bit Microcontroller
2004 IEEE International Symposium on Industrial Electronics, 2004Co-Authors: D. He, R.m. NelmsAbstract:This paper presents hybrid average current-mode control (ACMC) for a boost converter using an 8-Bit Microcontroller. In order to demonstrate the feasibility of a hybrid ACMC DC-DC converter, an ACMC boost converter operating in the continuous conduction mode has been designed using a PIC16C782 Microcontroller. System modeling, main design procedures, as well as some hardware and software implementation issues are discussed. Experimental results are presented, and encouragingly demonstrate the performance that a hybrid ACMC DC-DC converter can achieve. A pure analog controller using a UC3K86 analog control chip from Texas Instruments has also been implemented for comparison.
-
Peak current-mode control for a boost converter using an 8-Bit Microcontroller
IEEE 34th Annual Conference on Power Electronics Specialist 2003. PESC '03., 2003Co-Authors: D. He, R.m. NelmsAbstract:In a current-mode control (CMC) system, the inductor current has a fundamental frequency equal to the switching frequency that far exceeds the maximum sampling rate of most Microcontroller A/D converters. In order to demonstrate the feasibility of a Microcontroller-based CMC DC-DC converter, a peak current controller for a boost converter operating in the continuous conduction mode has been designed and implemented using a PIC16C782 Microcontroller. Practical issues in designing a digital CMC converter are briefly discussed. Experimental results are presented, and encouragingly demonstrate the performance that a Microcontroller-based CMC DC-DC converter can achieve. The digital controller has been compared to an analog controller based on a UC3842.
N. Gura - One of the best experts on this subject based on the ideXlab platform.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, Sheuelling Chang Shantz, N. Gura, Vipul Gupta, Sun Microsystems LaboratoriesAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATmega128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy Analysis ofPublic-Key Cryptography for Wireless Sensor Networks
Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and con-sider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that pub-lic-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications PerCom 2005, 2005Co-Authors: A S Wandert, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored. © 2005 IEEE.
Hans Eberle - One of the best experts on this subject based on the ideXlab platform.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, Sheuelling Chang Shantz, N. Gura, Vipul Gupta, Sun Microsystems LaboratoriesAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATmega128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy Analysis ofPublic-Key Cryptography for Wireless Sensor Networks
Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and con-sider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that pub-lic-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications PerCom 2005, 2005Co-Authors: A S Wandert, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored. © 2005 IEEE.
Vipul Gupta - One of the best experts on this subject based on the ideXlab platform.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, Sheuelling Chang Shantz, N. Gura, Vipul Gupta, Sun Microsystems LaboratoriesAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and elliptic curve cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATmega128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy Analysis ofPublic-Key Cryptography for Wireless Sensor Networks
Communications, 2005Co-Authors: Arvinderpal S Wander, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and con-sider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that pub-lic-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored.
-
Energy analysis of public-key cryptography for wireless sensor networks
Third IEEE International Conference on Pervasive Computing and Communications PerCom 2005, 2005Co-Authors: A S Wandert, Hans Eberle, N. Gura, Vipul Gupta, Sheuelling Chang ShantzAbstract:In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-Bit Microcontroller platform. We present a comparison of two public-key algorithms, RSA and Elliptic Curve Cryptography (ECC), and consider mutual authentication and key exchange between two untrusted parties such as two nodes in a wireless sensor network. Our measurements on an Atmel ATme-ga128L low-power Microcontroller indicate that public-key cryptography is very viable on 8-Bit energy-constrained platforms even if implemented in software. We found ECC to have a significant advantage over RSA as it reduces computation time and also the amount of data transmitted and stored. © 2005 IEEE.