共 50 条
[31]
An Efficient ID Based Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based Approach
[J].
APPLIED ALGORITHMS,
2014, 8321
:110-121
[32]
A Novel Elliptic Curve Cryptography Scheme Using Random Sequence
[J].
2015 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION ENGINEERING (ICCIE),
2015,
:46-49
[33]
Issues in Elliptic Curve Cryptography Implementation
[J].
INTERNETWORKING INDONESIA,
2009, 1 (01)
:29-33
[34]
An Efficient Method for text Encryption using Elliptic Curve Cryptography
[J].
PROCEEDINGS OF THE 2018 IEEE 8TH INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC 2018),
2018,
:96-101
[36]
Elliptic Curve Cryptography: A Dynamic Paradigm
[J].
2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS),
2017,
:427-431
[37]
COMPARATIVE ANALYSIS OF ELLIPTIC CURVE AND LATTICE BASED CRYPTOGRAPHY
[J].
PROCEEDINGS OF THE 2021 ANNUAL MODELING AND SIMULATION CONFERENCE (ANNSIM'21),
2020,
[38]
Elliptic curve cryptography on smart cards
[J].
8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING,
2004,
:162-167
[39]
A Critical Review on Elliptic Curve Cryptography
[J].
2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT),
2016,
:13-18