**Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks**

A. R. Naseer

16 Will-be-set-by-IN-TECH

[29] N. Koblitz. Elliptic curve cryptosystems. *Mathematics of computation*, 48(177):203–209,

[30] V. Miller. Use of elliptic curves in cryptography. In *Advances in Cryptology - CRYPTO*

[31] Kakali Chatterjee, Asok De, and Daya Gupta. Software Implementation of Curve based Cryptography for Constrained Devices. *International Journal of Computer Applications*,

[32] N. Koblitz. A family of jacobians suitable for discrete log cryptosystems. In *Advances in*

[33] L. Batina, N. Mentens, B. Preneel, and I. Verbauwhede. Flexible hardware architectures for curve-based cryptography. In *Circuits and Systems, 2006. ISCAS 2006. Proceedings. 2006*

[34] R.J.M. Maia. Análise da viabilidade da implementação de algoritmos pós-quânticos baseados em quase-grupos multivariados quadráticos em plataformas de processamento

[35] R. Ahlawat, K. Gupta, and S.K. Pal. From mq to mqq cryptography: Weaknesses new

[36] Thomas Wollinger, Jan Pelzl, Volker Wittelsberger, Christof Paar, Gökay Saldamli, and Çetin K. Koç. Elliptic and hyperelliptic curves on embedded *μ*P. *ACM Transactions on*

[37] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle, and Sheueling Chang Shantz. Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In *In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CUES 2004), Boston*

[38] Shish Ahmad, Mohd. Rizwan beg, and Qamar Abbas. Energy Saving Secure Framework for Sensor Network using Elliptic Curve Cryptography. *IJCA Special Issue on ?Mobile*

[39] Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, and Ingrid Verbauwhede. Public-Key Cryptography on the Top of a Needle. In *2007 IEEE International Symposium*

[40] T. Wollinger. *Software and hardware implementation of hyperelliptic curve cryptosystems*.

[41] S. Prasanna Ganesan. An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography. *International J. of Recent Trends in Engineering and*

[42] D. Gligoroski, S.J. Knapskog, S. Markovski, R.S. Ødegård, R.E. Jensen, L. Perret, and J.C. Faugère. The digital signature scheme mqq-sig. *Arxiv preprint arXiv:1010.3163*, 2010.

solutions. In *Western European Workshop on Research in Cryptology*, 2009.

1987.

24(5):18–23, 2011.

*Proceedings*, pages 417–426. Springer, 1986.

limitadas. Master's thesis, USP, 2010.

*Ad-hoc Networks?*, pages 167–172, 2010.

Europ. Univ.-Verl., 2004.

*Technology*, 3(2):2–4, 2010.

*Cryptology - Crypto88*, pages 94–99. Springer, 1990.

*IEEE International Symposium on*, pages 4–pp. IEEE, 2008.

*Embedded Computing Systems*, 3(3):509–533, August 2004.

*on Circuits and Systems*, pages 1831–1834. Ieee, May 2007.

*Marriott Cambridge Cambridge (Boston)August*, 2004.

Additional information is available at the end of the chapter

http://dx.doi.org/10.5772/50736
