共 50 条
- [31] Secure Data Access in Hadoop Using Elliptic Curve Cryptography ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
- [32] A secure user authentication protocol using elliptic curve cryptography JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
- [33] A mathematic application on secure electronic transaction: Elliptic curve cryptography Journal of Internet Technology, 2007, 8 (01): : 59 - 65
- [34] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography 2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
- [35] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography Telecommunication Systems, 2005, 29 : 165 - 180
- [36] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography 2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
- [37] High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n) PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 15 - 24
- [38] High-Performance FPGA Implementation of Modular Inversion over F256 for Elliptic Curve Cryptography 2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 169 - 174
- [39] Performance Evaluation of RSA and Elliptic Curve Cryptography PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 302 - 306