共 50 条
- [21] Blind authentication based on the elliptic curve cryptosystem Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2001, 35 (08): : 804 - 807
- [22] Improvement and Implementation of One Elliptic Curve Cryptography Algorithm INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT (EBM2011), VOLS 1-6, 2011, : 2438 - 2440
- [23] Algorithm and implementation of elliptic curve public key cryptography Gaojishu Tongxin/High Technology Letters, 2004, 14 (03):
- [24] An implemented of hybrid cryptography using elliptic curve cryptosystem (ECC) and MD5 2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 562 - 567
- [25] A new algorithm for a public key cryptosystem using elliptic curve 2017 EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS), 2017, : 17 - 22
- [26] Authentication protocol based on elliptic curve cryptography ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (02): : 83 - 91
- [29] FPGA Based Implementation of Elliptic Curve Cryptography 2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,