共 50 条
- [21] Verifiable threshold cryptosystems based on elliptic curve 2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 334 - 337
- [23] Novel Precomputation Schemes for Elliptic Curve Cryptosystems APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 71 - 88
- [24] Exceptional procedure attack on elliptic curve cryptosystems PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 224 - 239
- [25] Differential fault attacks on elliptic curve cryptosystems ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
- [26] Some Ways to Secure Elliptic Curve Cryptosystems Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
- [27] Voting protocol based on elliptic curve cryptosystems Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
- [28] Multi-threading elliptic curve cryptosystems ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
- [29] Parallel scalar multiplication for elliptic curve cryptosystems 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
- [30] Implementation of elliptic curve cryptosystems on a reconfigurable computer 2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 60 - 67