共 50 条
- [41] Over FP vs. over F2n and on Pentium vs. on Alpha in software implementation of hyperelliptic curve cryptosystems INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99, 2000, 1787 : 82 - 101
- [43] Novel Precomputation Schemes for Elliptic Curve Cryptosystems APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
- [44] Verifiable threshold cryptosystems based on elliptic curve 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337
- [45] Exceptional procedure attack on elliptic curve cryptosystems PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
- [46] Differential fault attacks on elliptic curve cryptosystems ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
- [47] Some Ways to Secure Elliptic Curve Cryptosystems Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
- [48] Voting protocol based on elliptic curve cryptosystems Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
- [49] Multi-threading elliptic curve cryptosystems ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
- [50] Parallel scalar multiplication for elliptic curve cryptosystems 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73