共 50 条
[42]
AN EFFICIENT ELLIPTIC CURVE CRYPTOGRAPHY PROCESSOR USING ADDITION CHAINS WITH HIGH INFORMATION ENTROPY
[J].
2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE),
2012,
[43]
Quantum Cryptography for Future Networks Security: A Systematic Review
[J].
IEEE ACCESS,
2024, 12
:180048-180078
[44]
Computational Refinements for Post-Quantum Elliptic Curve Security
[J].
2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022,
2022,
:32-35
[45]
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm
[J].
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 7,
2005, 7
:137-142
[47]
A New Security Protocol Using Hybrid Cryptography Algorithms
[J].
2013 9TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO 2013): TODAY INFORMATION SOCIETY WHAT'S NEXT?,
2014,
:109-115
[48]
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
[J].
WIRELESS SENSOR NETWORKS,
2008, 4913
:305-+
[49]
Securing Resource Constraints Embedded Devices Using Elliptic Curve Cryptography
[J].
SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII,
2014, 9085
[50]
Elliptic Curve Cryptography on Constrained Microcontrollers Using Frequency Domain Arithmetic
[J].
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS, PART VI - ICCSA 2014,
2014, 8584
:493-506