共 50 条
- [21] Issues in Elliptic Curve Cryptography Implementation INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
- [22] Hyper-and-elliptic-curve cryptography LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
- [23] Elliptic Curve Cryptography: A Dynamic Paradigm 2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
- [24] Compiler assisted elliptic curve cryptography ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
- [26] A New Approach to Elliptic Curve Cryptography 2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
- [27] Analysis of Elliptic Curve Cryptography & RSA Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
- [28] Elliptic curve cryptography on constraint environments 38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
- [29] A reconfiguration hierarchy for elliptic curve cryptography CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
- [30] Optimal Implementation of Elliptic Curve Cryptography 2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39