Elliptic curve coding technique application for digital signature
暂无分享,去创建一个
[1] Steven Hernandez Cissp. Official (ISC)2 Guide to the CISSP CBK , 2012 .
[2] Bart Preneel,et al. Open problems in hash function security , 2015, Designs, Codes and Cryptography.
[3] J. Vacca. Public Key Infrastructure: Building Trusted Applications and Web Services , 2004 .
[4] Xue Sun,et al. An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography , 2009, 2009 International Conference on Computer and Communications Security.
[5] Wei Shi,et al. Implementation of elliptic curve Diffie-Hellman key agreement scheme on IRIS nodes , 2015, Proceedings of 2015 International Conference on Intelligent Computing and Internet of Things.
[6] A. B. Elmadani. Digital signature forming and keys protection based on person's characteristics , 2012, 2012 International Conference on Information Technology and e-Services.
[7] Hamid Sarbazi-Azad,et al. A general mathematical performance model for wormhole-switched irregular networks , 2009, Cluster Computing.
[8] Mahmoud T. El-Hadidi,et al. A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[9] Ivan Damgård,et al. Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions , 2015, EUROCRYPT.
[10] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[11] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[12] Chengming Qi,et al. A new threshold signature scheme based on ECC and factoring , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[13] Massoud Masoumi,et al. Novel Approach to Protect Advanced Encryption Standard Algorithm Implementation Against Differential Electromagnetic and Power Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[14] Jonathan Katz,et al. Hash Functions from Defective Ideal Ciphers , 2015, CT-RSA.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Alexander Vasiliev,et al. Cryptographic quantum hashing , 2014 .
[17] F. Ahmad,et al. Java Model of DSA (Digital Signature Algorithm) , 2002 .
[18] O. O. Meleshko,et al. ELLIPTIC CURVE CRYPTOGRAPHY , 2014 .