Constructing elliptic curve cryptosystem over finite field

被引:0
|
作者
Zhang, Longjun
Zhao, Lin
Shen, Junyi
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1039 / 1041
相关论文
共 50 条
  • [41] Elliptic curve cryptography over binary finite field GF(2m)
    Department of Physics, Eastern Mediterranean University, via Mersin 10, Gazimagusa, North Cyprus, Turkey
    Inf. Technol. J., 2006, 1 (204-229):
  • [42] Research on Fast Scalable Implementation of Elliptic Curve Cryptosystem on NIST Prime Field
    Shen, Guicheng
    Liu, Bingwu
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [43] A parallelized design for an elliptic curve cryptosystem coprocessor
    Sozzani, F
    Bertoni, G
    Turcato, S
    Breveglieri, L
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 626 - 630
  • [44] PERFORMANCE ANALYSIS OF ELLIPTIC AND HYPERELLIPTIC CURVE CRYPTOSYSTEM
    Ganesan, R.
    Vivekanandan, K.
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING, 2009, : 311 - +
  • [45] Coordinate System for Elliptic Curve Cryptosystem on Twisted Edwards Curve
    Shirase, Masaaki
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 9 - 10
  • [46] INVALID-CURVE ATTACKS ON (HYPER)ELLIPTIC CURVE CRYPTOSYSTEM
    Karabina, Koray
    Ustaoglu, Berkant
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (03) : 307 - 321
  • [47] Security enhanced elliptic curve cryptosystem approach
    Zhang, Longjun
    Shen, Junyi
    Zhao, Lin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (10): : 1038 - 1041
  • [48] Error correction method in an elliptic curve cryptosystem
    Bessalov, AV
    Telizhenko, AB
    IZVESTIYA VYSSHIKH UCHEBNYKH ZAVEDENII RADIOELEKTRONIKA, 2000, 43 (3-4): : A60 - A65
  • [49] The application of elliptic curve cryptosystem in wireless communication
    Jia, XY
    Wang, C
    IEEE 2005 INTERNATIONAL SYMPOSIUM ON MICROWAVE, ANTENNA, PROPAGATION AND EMC TECHNOLOGIES FOR WIRELESS COMMUNICATIONS PROCEEDINGS, VOLS 1 AND 2, 2005, : 1602 - 1605
  • [50] Blind authentication based on the elliptic curve cryptosystem
    Zhang, Longjun
    Shen, Junyi
    Zhao, Lin
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (08): : 804 - 807