On Assurance of Information Security using Elliptic Curves Cryptosystems
暂无分享,去创建一个
[1] Kyung-Sang Sung,et al. XML Document Encrypt Implementation Using Elliptic Curve Cryptosystem , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[2] Marisa W. Paryasto,et al. Issues in Elliptic Curve Cryptography Implementation , 2009 .
[3] Kouichi Sakurai,et al. Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems , 1991, CRYPTO.
[4] Alfred Menezes,et al. Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.
[5] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[6] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[7] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[8] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[9] Douglas Stebila,et al. Performance analysis of elliptic curve cryptography for SSL , 2002, WiSE '02.
[10] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[11] Neal Koblitz,et al. Hyperelliptic cryptosystems , 1989, Journal of Cryptology.
[12] Ingrid Verbauwhede,et al. Elliptic-Curve-Based Security Processor for RFID , 2008, IEEE Transactions on Computers.
[13] R. Shanmugalakshmi,et al. Research Issues on Elliptic Curve Cryptography and Its applications , 2009 .
[14] Jean-Jacques Quisquater,et al. High-speed hardware implementations of Elliptic Curve Cryptography: A survey , 2007, J. Syst. Archit..