共 50 条
- [41] Differential fault attacks on elliptic curve cryptosystems ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
- [42] Some Ways to Secure Elliptic Curve Cryptosystems Advances in Applied Clifford Algebras, 2008, 18 : 677 - 688
- [43] Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET: A Survey and Analysis INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (09): : 1 - 12
- [44] Voting protocol based on elliptic curve cryptosystems Dianzi Kexue Xuekan/Journal of Electronics, 2000, 22 (01): : 84 - 89
- [46] Multi-threading elliptic curve cryptosystems ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 134 - 139
- [47] Parallel scalar multiplication for elliptic curve cryptosystems 2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
- [48] A short course to introduce Elliptic Curve Cryptosystems ADVANCED RESEARCH IN COMPUTERS AND COMMUNICATIONS IN EDUCATION, VOL 2: NEW HUMAN ABILITIES FOR THE NETWORKED SOCIETY, 1999, 55 : 874 - 875
- [49] Implementation and Analysis of Elliptic Curve Cryptosystems over Polynomial basis and ONB PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 130 - 134
- [50] Implementation of elliptic curve cryptosystems on a reconfigurable computer 2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 60 - 67