Implementation of Text Encryption using Elliptic Curve Cryptography
暂无分享,去创建一个
[1] Scott A. Vanstone,et al. Elliptic curve cryptosystem - The answer to strong, fast public-key cryptography for securing constrained environments , 1997, Inf. Secur. Tech. Rep..
[2] L. Washington. Elliptic Curves: Number Theory and Cryptography , 2003 .
[3] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[4] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[5] Moad Yassin Mowafi,et al. Use of elliptic curve cryptography for multimedia encryption , 2013, IET Inf. Secur..
[6] K. Muneeswaran,et al. Implementation of text based cryptosystem using Elliptic Curve Cryptography , 2009, 2009 First International Conference on Advanced Computing.
[7] A. Chandrasekhar,et al. Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.
[8] Navi Mumbai,et al. IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY ON TEXT AND IMAGE , 2011 .
[9] Moncef Amara,et al. Elliptic Curve Cryptography and its applications , 2011, International Workshop on Systems, Signal Processing and their Applications, WOSSPA.
[10] Kimmo Järvinen,et al. On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..
[11] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[12] S. Tamilselvan,et al. Enhancing security in text messages using matrix based mapping and ElGamal method in elliptic curve cryptography , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[13] William Stallings,et al. Cryptography and network security , 1998 .