A Closer Look at SMS-Based E-Banking Services Using Elliptic Curves
暂无分享,去创建一个
Ranbir Soram | Memeta Khomdram | Sonamani Takhellambam | Ranbir Soram | Memeta Khomdram | S. Takhellambam
[1] T. Koshy. Elementary Number Theory with Applications , 2001 .
[2] Jonathan Reynolds,et al. Rational points on elliptic curves , 2006 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[5] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[6] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[7] Ranbir Soram,et al. Mobile SMS Banking Security Using Elliptic Curve Cryptosystem , 2009 .
[8] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[9] W. Ford,et al. Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption , 2000 .
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Erdinc Ozturk. Low Power Elliptic Curve Cryptography , 2005 .
[12] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[13] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[14] Min-Shiang Hwang,et al. A modified remote user authentication scheme using smart cards , 2003, IEEE Trans. Consumer Electron..
[15] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[16] Tanja Lange,et al. Handbook of Elliptic and Hyperelliptic Curve Cryptography , 2005 .
[17] Alfred Menezes,et al. A Survey of Public-Key Cryptosystems , 2004, SIAM Rev..
[18] Otto F. G. Schilling,et al. Basic Abstract Algebra , 1975 .
[19] William Stallings,et al. Cryptography and network security , 1998 .