Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
暂无分享,去创建一个
K. Murugan | S. Shridevi | B. Prasanalakshmi | Yu-Chen Hu | Shermin Shamsudheen | Karthik Srinivasan | K. Murugan | Yu-Chen Hu | S. Shridevi | Shermin Shamsudheen | Karthik Srinivasan | Prasanalakshmi Balaji
[1] Tanja Lange,et al. Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae , 2002, IACR Cryptol. ePrint Arch..
[2] Christof Paar,et al. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves , 2003, CHES.
[3] B. Gomathi,et al. Biometric Cryptosystem Involving Two Traits And Palm Vein As Key , 2012 .
[4] D. Cantor. Computing in the Jacobian of a hyperelliptic curve , 1987 .
[5] Neal Koblitz,et al. Hyperelliptic cryptosystems , 1989, Journal of Cryptology.
[6] K. V. Suresh,et al. AUTOMATIC ROI EXTRACTION IN NOISY MEDICAL IMAGES , 2017 .
[7] Padma Bh,et al. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .
[8] Mohamed Elhoseny,et al. Secure and Robust Fragile Watermarking Scheme for Medical Images , 2018, IEEE Access.
[9] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[10] Christof Paar,et al. Low Cost Security: Explicit Formulae for Genus-4 Hyperelliptic Curves , 2003, Selected Areas in Cryptography.
[11] Dmitry B. Goldgof,et al. Comparison of Edge Detector Performance through Use in an Object Recognition Task , 2001, Comput. Vis. Image Underst..
[12] Koh-ichi Nagao. Improving Group Law Algorithms for Jacobians of Hyperelliptic Curves , 2000, ANTS.
[13] Shao-zhen Ye,et al. Medical Image Retrieval Based on Extraction of Region of Interest , 2010, 2010 4th International Conference on Bioinformatics and Biomedical Engineering.
[14] Anil Kumar,et al. RGB channel based decision tree grey-alpha medical image steganography with RSA cryptosystem , 2017, Int. J. Mach. Learn. Cybern..
[15] Seyed Mojtaba Mousavi,et al. A Heuristic Automatic and Robust ROI Detection Method for Medical Image Warermarking , 2015, Journal of Digital Imaging.
[16] Mohammed Nazeh Abdul Wahid,et al. A Comparison of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish for Guessing Attacks Prevention , 2018 .
[18] A. K. Mandal,et al. Performance evaluation of cryptographic algorithms: DES and AES , 2012, 2012 IEEE Students' Conference on Electrical, Electronics and Computer Science.
[19] W. Gareth J. Howells,et al. Direct Template-Free Encryption Key Generation from Palm-Veins , 2012, 2012 Third International Conference on Emerging Security Technologies.
[20] S. Samavi,et al. Region of interest extraction for lossless compression of bone X-ray images , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).