共 50 条
- [31] User authentication scheme based on elliptic curve cryptosystem Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
- [33] Design and Implementation of A Elliptic Curve Cryptosystem Based on SoC 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 731 - 733
- [36] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
- [37] A GPU implementation of the Montgomery multiplication algorithm for elliptic curve cryptography 2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 2593 - 2596
- [38] DES Algorithm Security Fortification Using Elliptic Curve Cryptography 2015 TENTH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2015, : 335 - 340
- [39] Secured Session Key Agreement Protocol for Iris Cryptosystem Using Customized Elliptic Curve Cryptography INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 147 - 158
- [40] Embedment Of Montgomery Algorithm On Elliptic Curve Cryptography Over RSA Public Key Cryptography INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 911 - 917