共 50 条
- [31] Secure Localization Using Elliptic Curve Cryptography in Wireless Sensor Networks [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (06): : 255 - 261
- [32] Low-cost elliptic curve cryptography for wireless sensor networks [J]. SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 6 - +
- [33] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
- [34] Efficient multiplication in GF(pk) for elliptic curve cryptography [J]. 16TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC, PROCEEDINGS, 2003, : 181 - 187
- [35] Elliptic Curve Cryptography: A Dynamic Paradigm [J]. 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
- [36] Hardware Design and Implementation of Scalar Multiplication in Elliptic Curve Cryptography (ECC) over GF (2163) on FPGA [J]. 2015 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2015,
- [38] Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography [J]. 2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024, 2024,
- [39] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1397 - 1401
- [40] The advantages of elliptic curve cryptography for wireless security [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67