共 50 条
- [21] ELLIPTIC CURVE CRYPTOGRAPHY FOR CONSTRAINED DEVICES IN INTERNET OF THINGS AND INDUSTRY 4.0 [J]. PROCEEDINGS II OF THE 26TH CONFERENCE STUDENT EEICT 2020, 2020, : 48 - 51
- [22] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
- [23] The state of elliptic curve cryptography [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
- [24] Elliptic Curve Cryptography on PocketPCs [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
- [25] Elliptic Curve Cryptography in Practice [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
- [27] The State of Elliptic Curve Cryptography [J]. Designs, Codes and Cryptography, 2000, 19 : 173 - 193
- [28] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
- [29] A survey of elliptic curve cryptography [J]. Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
- [30] Research on elliptic curve cryptography [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701