Search

Your search keyword '"Elliptic curve cryptosystem"' showing total 544 results

Search Constraints

Start Over You searched for: Descriptor "Elliptic curve cryptosystem" Remove constraint Descriptor: "Elliptic curve cryptosystem"
544 results on '"Elliptic curve cryptosystem"'

Search Results

1. Input–Output Scheduling and Control for Efficient FPGA Realization of Digit-Serial Multiplication Over Generic Binary Extension Fields.

2. An Elliptic Curve-Based Privacy-Preserving Recommender System

3. Dynamic analysis of new two‐dimensional fractional‐order discrete chaotic map and its application in cryptosystem.

4. Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform

5. Improvement of image transmission using chaotic system and elliptic curve cryptography.

6. 低功耗嵌入式平台的 SM2 国密算法优化实现.

7. Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems

8. A Secured Biometric-Based Authentication Scheme in IoT-Based Patient Monitoring System

9. Improved Software Implementation for Montgomery Elliptic Curve Cryptosystem.

10. PF-AID-2KAP: Pairing-Free Authenticated Identity-Based Two-Party Key Agreement Protocol for Resource-Constrained Devices

11. Cryptanalysis of Improved and Provably Secure Three-Factor User Authentication Scheme for Wireless Sensor Networks

13. FRACTIONAL QUANTUM LOGISTIC MAP AND ITS APPLICATION IN IMAGE ENCRYPTION TECHNOLOGY.

14. On the first fall degree of summation polynomials

15. A Secure Anonymous E-Voting System Using Identity-Based Blind Signature Scheme

16. Image encryption based on elliptic curve cryptosystem.

17. An intelligent and robust conditional privacy preserving authentication and group‐key management scheme for vehicular ad hoc networks using elliptic curve cryptosystem.

18. Pseudo 4D projective coordinate-based multi-base scalar multiplication

19. Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems

20. Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석.

23. Improved authenticated elliptic curve cryptography scheme for resource starve applications

25. Analysis of Fractional ωmbNAF for Scalar Multiplication

26. Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols

27. Provable Data Possession using Additive Homomorphic Encryption

28. A Robust and Hybrid Cryptosystem for Identity Authentication

30. A novel maximum distance separable code to generate universal identifiers.

31. Alternative Method to Find the Number of Points on Koblitz Curve.

32. Koblitz Curves over Quadratic Fields.

33. A secure and efficient three-factor authentication protocol for IoT environments.

34. TTP Based High-Efficient Multi-Key Exchange Protocol

37. Low-Cost Countermeasure against RPA

43. Same Values Power Analysis Using Special Points on Elliptic Curves

46. Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations

47. Breaking and Building of Threshold Signcryption Schemes

48. Efficient Techniques for High-Speed Elliptic Curve Cryptography

49. Width-3 Joint Sparse Form

50. Java Implementation for Pairing-Based Cryptosystems

Catalog

Books, media, physical & digital resources