A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing
暂无分享,去创建一个
[1] Kamlesh Dutta,et al. A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment , 2010 .
[2] Sanjay Kumar Jena,et al. A Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP , 2009, 2009 International Conference on Advanced Computer Control.
[3] Kuldip Singh,et al. A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards , 2010 .
[4] Subhendu Kumar Pani,et al. A modified remote user authentication scheme using smart card based on ECDLP , 2009, 2009 International Conference on Industrial and Information Systems (ICIIS).
[5] Christof Paar,et al. Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.
[6] Emmanuel Opara,et al. Bioinetric and Systems Security: An Overview of End-To-End Security System , 2015, Communications of the IIMA.
[7] Ahmad Khaled M. Al-Kayali,et al. Elliptic Curve Cryptography and Smart Cards , 2004 .
[8] E. Dawson,et al. Implementing an efficient elliptic curve cryptosystem over $GF(p)$ on a smart card , 2003 .
[9] K. Goyal,et al. A NOVEL REMOTE USER AUTHENTICATION SCHEME USING SMART CARD WITH BIOMETRIC BASED ON ECDLP , 2011 .
[10] Paulo S. L. M. Barreto,et al. Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.
[11] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[12] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[13] Antonio Bernardino de Almeida,et al. A Review of Smartcard Security Issues , 2011 .
[14] Wasim A. Al-Hamdani. Elliptic curve for data protection , 2011, InfoSecCD.
[15] Elisa Bertino,et al. Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.