An Improved Encryption and Signature Verification ECC Scheme for Cloud Computing
暂无分享,去创建一个
[1] Kin Choong Yow,et al. A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES , 2010 .
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] P. Mell,et al. The NIST Definition of Cloud Computing , 2011 .
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] A. Chandrasekhar,et al. Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.
[6] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[7] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[8] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[9] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[10] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[11] Yu-Fang Chung,et al. ID-based digital signature scheme on the elliptic curve cryptosystem , 2007, Comput. Stand. Interfaces.
[12] Mohsen Machhout,et al. Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor , 2010, International journal of Network Security & Its Applications.
[13] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[14] Omar Khadir,et al. New digital signature protocol based on elliptic curves , 2012, ArXiv.
[15] A. Chandrasekhar,et al. Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields , 2011 .
[16] K R Chandrasekhara Pillai,et al. Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment , 2010 .