共 50 条
- [41] Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem Journal of Computer Science and Technology, 2007, 22 : 92 - 94
- [44] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications 2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
- [45] Pipelined computation of scalar multiplication in elliptic curve cryptosystems CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 328 - 342
- [46] Secure and Compact Elliptic Curve LR Scalar Multiplication INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 605 - 618
- [47] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462
- [48] Efficient flush-reload cache attack on scalar multiplication based signature algorithm Science China Information Sciences, 2018, 61
- [49] Low-Latency Elliptic Curve Scalar Multiplication International Journal of Parallel Programming, 2012, 40 : 532 - 550
- [50] Efficient Elliptic Curve Parallel Scalar Multiplication Methods 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 116 - 123