Constructing elliptic curve cryptosystem over finite field

被引:0
|
作者
Zhang, Longjun
Zhao, Lin
Shen, Junyi
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1039 / 1041
相关论文
共 50 条
  • [21] Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime Fields
    Yang, Guoqiang
    Kong, Fanyu
    Xu, Qiuliang
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 243 - 249
  • [22] Determining the 2-Sylow subgroup of an elliptic curve over a finite field
    Miret, J
    Moreno, R
    Rio, A
    Valis, M
    MATHEMATICS OF COMPUTATION, 2005, 74 (249) : 411 - 427
  • [23] COMPUTING THE l-POWER TORSION OF AN ELLIPTIC CURVE OVER A FINITE FIELD
    Miret, J.
    Moreno, R.
    Rio, A.
    Valls, M.
    MATHEMATICS OF COMPUTATION, 2009, 78 (267) : 1767 - 1786
  • [24] The design and implementation for elliptic curve cryptosystem
    Zhang, L
    Lu, C
    Wei, MS
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1070 - 1074
  • [25] FPGA IMPLEMENTATION OF AN ELLIPTIC CURVE CRYPTOSYSTEM
    Hritcu, Daniel
    Radoi, Ionut
    PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 360 - 365
  • [26] Juxtaposition of RSA and Elliptic Curve Cryptosystem
    Soram, Ranbir
    Khomdram, Memeta
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (09): : 11 - 21
  • [27] Scan Attack on Elliptic Curve Cryptosystem
    Ali, Sk Subidh
    Sinanoglu, Ozgur
    PROCEEDINGS OF THE 2015 IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFTS), 2015, : 115 - 118
  • [28] On the Performance of Elliptic Curve Public Cryptosystem
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 24 - 29
  • [29] An MSS based on the elliptic curve cryptosystem
    Sahu, Hemlal
    Sharma, Birendra Kumar
    International Journal of Network Security, 2010, 11 (02) : 118 - 120
  • [30] The design and analysis of an elliptic curve cryptosystem
    Jan, GE
    Shen, CM
    Leu, SW
    Li, CH
    VLSI'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VLSI, 2003, : 324 - 328