Time stamp based ECC encryption and decryption
暂无分享,去创建一个
[1] A. Vinaya Babu,et al. A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support , 2010, ArXiv.
[2] Çetin Kaya Koç,et al. High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor , 2001 .
[3] A. Vinaya Babu,et al. A New Model Based Encryption Mechanism With Time Stamp, Acknowledgement Support , 2010, Int. J. Netw. Secur..
[4] Wen Gao,et al. Elliptic Curve Cryptography Based Wireless Authentication Protocol , 2007, Int. J. Netw. Secur..
[5] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[6] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[7] Alfred Menezes,et al. Software Implementation of Elliptic Curve Cryptography over Binary Fields , 2000, CHES.
[8] Barry E. Mullins,et al. Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks , 2007, Int. J. Secur. Networks.
[9] William Stallings,et al. Cryptography and network security , 1998 .
[10] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[11] Wayne Luk,et al. Customizable elliptic curve cryptosystems , 2005, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[12] Hyunsoo Yoon,et al. Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field , 2007, Int. J. Netw. Secur..
[13] Gang Chen,et al. A High-Performance Elliptic Curve Cryptographic Processor for General Curves Over ${\rm GF}(p)$ Based on a Systolic Arithmetic Unit , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.
[14] M. Indra Devi,et al. Knapsack Based ECC Encryption and Decryption , 2009, Int. J. Netw. Secur..
[15] Sangook Moon,et al. A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems , 2006, Int. J. Netw. Secur..