A New Method of Encryption Algorithm Based on Chaos and ECC
暂无分享,去创建一个
Songyan Liu | Qun Ding | Nan Jia | Shangru Wu | Xuming Pan | Q. Ding | Xuming Pan | Shangru Wu | Nan Jia | Songyan Liu
[1] Erich Wenger,et al. Harder, better, faster, stronger: elliptic curve discrete logarithm computations on FPGAs , 2016, Journal of Cryptographic Engineering.
[2] Mohammad S. Obaidat,et al. A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography , 2017, Int. J. Comput. Math..
[3] Jing Pan,et al. A New Improved Scheme of Chaotic Masking Secure Communication Based on Lorenz System , 2012, Int. J. Bifurc. Chaos.
[4] Jing Pan,et al. Design and Hardware Implementation of FPGA & Chaotic Encryption-based Wireless Transmission System , 2011, 2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control.
[5] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points over GF(p) , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[6] Leon O. Chua,et al. Cryptography based on chaotic systems , 1997 .
[7] Geng Zhao,et al. Research on Elliptic Curve Cryptographic Algorithms Based on Chaotic System , 2013, 2013 International Conference on Computer Sciences and Applications.
[8] Guo Kui,et al. A new elliptic curve cryptosystem algorithm based on the system of chebyshev polynomial , 2014, 2014 IEEE 7th Joint International Information Technology and Artificial Intelligence Conference.
[9] Li Man-gui. Study on Public Key Infrastructure in Support of Public Key Cryptographic Algorithm SM2 based on Elliptic Curves , 2011 .
[10] Asif Ullah Khan,et al. Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[11] Qiang Liu,et al. FPGA Design and Applicable Analysis of Discrete Chaotic Maps , 2014, Int. J. Bifurc. Chaos.
[12] Arjen K. Lenstra,et al. On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography , 2009, IACR Cryptol. ePrint Arch..
[13] Yuh-Min Tseng,et al. Efficient searchable ID-based encryption with a designated server , 2014, Ann. des Télécommunications.
[14] Yuh-Min Tseng,et al. Efficient Revocable Multi-Receiver ID-Based Encryption , 2013, Inf. Technol. Control..
[15] Shay Gueron,et al. Fast software implementation of binary elliptic curve cryptography , 2015, Journal of Cryptographic Engineering.
[16] Tim Güneysu,et al. Utilizing hard cores of modern FPGA devices for high-performance cryptography , 2011, Journal of Cryptographic Engineering.
[17] Q. Ding,et al. Research on the quantifications of chaotic random number generators , 2013 .
[18] Kazuhiro Yokoyama,et al. Elliptic curve cryptosystem , 2000 .
[19] Edlyn Teske,et al. Speeding Up Pollard's Rho Method for Computing Discrete Logarithms , 1998, ANTS.
[20] Joe Suzuki,et al. Elliptic Curve Discrete Logarithms and the Index Calculus , 1998, ASIACRYPT.
[21] M. Baptista. Cryptography with chaos , 1998 .
[22] Kwok-Wo Wong,et al. A random number generator based on elliptic curve operations , 2004 .