共 50 条
- [21] An authenticated group key transfer protocol using elliptic curve cryptography [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 857 - 864
- [22] A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm [J]. 2019 2ND INTERNATIONAL CONFERENCE ON COMPUTING AND BIG DATA (ICCBD 2019), 2019, : 73 - 80
- [24] Point choosing algorithm of elliptic curve cryptography [J]. Lu, Chen, 2000, Xi'an Jiaotong Univ, China (34):
- [25] Research and Optimizing of the Algorithm of Elliptic Curve Cryptography [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1219 - 1225
- [26] An RNS Implementation of the Elliptic Curve Cryptography for IoT Security [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 66 - 72
- [28] An authenticated key exchange protocol in elliptic curve cryptography [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
- [30] Deniable authentication protocol based on elliptic curve cryptography [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67