Constructing elliptic curve cryptosystem over finite field

被引:0
|
作者
Zhang, Longjun
Zhao, Lin
Shen, Junyi
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1039 / 1041
相关论文
共 50 条
  • [1] Performance of finite field arithmetic in an elliptic curve cryptosystem
    Li, Z
    Higgins, J
    Clement, M
    NINTH INTERNATIONAL SYMPOSIUM ON MODELING, ANALYSIS AND SIMULATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, PROCEEDINGS, 2001, : 249 - 256
  • [2] Research of secure elliptic curve cryptosystem based on the finite field Fp
    2001, Shenyang Institute of Computing Technology (22):
  • [3] ISOMORPHIC TRANSFORMATIONS OF AN ELLIPTIC CURVE OVER A FINITE FIELD
    Chevardin, V. E.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2013, 49 (03) : 472 - 474
  • [4] Two hardware implementations of the group operations necessary for implementing an elliptic curve cryptosystem over a characteristic two finite field
    Potgieter, MJ
    van Dyk, BJ
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 187 - 192
  • [5] Elliptic curve cryptosystem
    Torii, Naoya
    Yokoyama, Kazuhiro
    Fujitsu Scientific and Technical Journal, 2000, 36 (02): : 140 - 146
  • [6] Elliptic curve cryptosystem
    Torii, N
    Yokoyama, K
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 140 - 146
  • [7] ON THE EXPONENT OF THE GROUP OF POINTS OF AN ELLIPTIC CURVE OVER A FINITE FIELD
    Pappalardi, Francesco
    PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY, 2011, 139 (07) : 2337 - 2341
  • [8] Method of improving an elliptic curve cryptosystem over the ring Zn
    Bai, GQ
    Hu, YP
    Xiao, GZ
    CHINESE JOURNAL OF ELECTRONICS, 2000, 9 (01): : 89 - 91
  • [9] Analyzing the Point Multiplication Operation of Elliptic Curve Cryptosystem over Prime Field for Parallel Processing
    Sakthivel, Arumugam
    Nedunchezhian, Raju
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (04) : 322 - 328
  • [10] A FAST ELLIPTIC CURVE CRYPTOSYSTEM
    AGNEW, GB
    MULLIN, RC
    VANSTONE, SA
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 706 - 708