A performance analysis on elliptic curve cryptography in network security
暂无分享,去创建一个
[1] Sharad Kumar Verma. A Discussion on Elliptic Curve Cryptography and Its Applications , 2012 .
[2] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[3] Antoine Joux,et al. A One Round Protocol for Tripartite Diffie–Hellman , 2000, Journal of Cryptology.
[4] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[5] Neal Koblitz,et al. An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm , 1998, CRYPTO.
[6] Kin Choong Yow,et al. A LIGHT-WEIGHT MUTUAL AUTHENTICATION AND KEY-EXCHANGE PROTOCOL BASED ON ELLIPTICAL CURVE CRYPTOGAPHY FOR ENERGY-CONSTRAINED DEVICES , 2010 .
[7] Mohsen Machhout,et al. Coupled FPGA/ASIC Implementation of Elliptic Curve Crypto-Processor , 2010, International journal of Network Security & Its Applications.
[8] Vipul Gupta,et al. An End-to-End Systems Approach to Elliptic Curve Cryptography , 2002, CHES.
[9] Peter Gemmell,et al. Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack , 2001, Journal of Cryptology.
[10] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[11] A. Enge,et al. Elliptic Curves and Their Applications to Cryptography , 1999, Springer US.
[12] Bo Sheng,et al. Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.
[13] A. Chandrasekhar,et al. Encryption of Data using Elliptic Curve over Finite fields , 2012, ArXiv.
[14] A. Chandrasekhar,et al. Secure Key Transport in Symmetric Cryptographic Protocols using some Elliptic Curves over finite fields , 2011 .
[15] K R Chandrasekhara Pillai,et al. Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained Network Environment , 2010 .