Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks
暂无分享,去创建一个
[1] A TawalbehLo'ai,et al. Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm , 2010 .
[2] Zhe Liu,et al. MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks , 2014, ACNS.
[3] Craig Costello,et al. Selecting elliptic curves for cryptography: an efficiency and security analysis , 2016, Journal of Cryptographic Engineering.
[4] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[5] P. L. Montgomery. Speeding the Pollard and elliptic curve methods of factorization , 1987 .
[6] Cheng-Chi Lee,et al. Cryptanalysis and improvement of a ECDLP based proxy blind signature scheme , 2018 .
[7] Qun Li,et al. Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.
[8] Tanja Lange,et al. Twisted Edwards Curves , 2008, AFRICACRYPT.
[9] Hwajeong Seo,et al. On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age , 2017, IEEE Transactions on Dependable and Secure Computing.
[10] Saadeh Sweidan,et al. Hardware Design and Implementation of ElGamal Public-Key Cryptography Algorithm , 2010, Inf. Secur. J. A Glob. Perspect..
[11] Jorge Sá Silva,et al. Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.
[12] Tim Güneysu,et al. MicroECC: A Lightweight Reconfigurable Elliptic Curve Crypto-processor , 2011, 2011 International Conference on Reconfigurable Computing and FPGAs.
[13] Feng-Hsiag Hsiao,et al. Applying elliptic curve cryptography to a chaotic synchronisation system: neural-network-based approach , 2017, Int. J. Syst. Sci..
[14] Nissa Mehibel,et al. A new enhancement of elliptic curve digital signature algorithm , 2020, Journal of Discrete Mathematical Sciences and Cryptography.