共 50 条
- [42] Secure Session Key Sharing Using Public Key Cryptography PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 573 - 576
- [43] A new public-key cryptography based on chaotic attractors of neural networks PROGRESS IN INTELLIGENCE COMPUTATION & APPLICATIONS, 2005, : 293 - 300
- [44] Public key cryptography based on Moufang loops JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2411 - 2427
- [46] Emerging standards for public-key cryptography LECTURES ON DATA SECURITY: MODERN CRYPTOLOGY IN THEORY AND PRACTICE, 1999, 1561 : 87 - 104
- [47] Certificateless Public Key Cryptography: A Research Survey INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
- [48] A Reconfigurable Coprocessor for Public-Key Cryptography PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 141 - 145
- [49] Modular Multiplication for Public Key Cryptography on FPGAs ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1096 - 1100
- [50] New architectures for low-cost public key cryptography on RFID tags 2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, 2007, : 1827 - +