메뉴 건너뛰기




Volumn 3280, Issue , 2004, Pages 935-944

A survey of public-key cryptography on J2ME-enabled mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GEOMETRY; GOVERNMENT DATA PROCESSING; JAVA PROGRAMMING LANGUAGE; MOBILE DEVICES; MOBILE PHONES; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 35048846501     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30182-0_94     Document Type: Article
Times cited : (15)

References (19)
  • 3
    • 0034215495 scopus 로고    scopus 로고
    • The Montgomery Modular Inverse-Revisited
    • Savas, E., Koç, Ç.K.: The Montgomery Modular Inverse-Revisited. IEEE Transactions on Computers 49(7) (2000) 763-766
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.7 , pp. 763-766
    • Savas, E.1    Koç, Ç.K.2
  • 4
    • 0038670954 scopus 로고    scopus 로고
    • Software Implementation of Elliptic Curve Cryptography over Binary Fields
    • Koç Ç. K., Paar C. (eds.): Cryptographic Hardware and Embedded Systems -CHES 2000. Springer Verlag, Berlin, Germany
    • Hankerson, D.R. , Lopez Hernandez J.C., Menezes A.J.: Software Implementation of Elliptic Curve Cryptography over Binary Fields. In: Koç Ç. K., Paar C. (eds.): Cryptographic Hardware and Embedded Systems -CHES 2000. Lecture Notes in Computer Science, Vol. 1965. Springer Verlag, Berlin, Germany, (2000) 1-24
    • (2000) Lecture Notes in Computer Science , vol.1965 , pp. 1-24
    • Hankerson, D.R.1    Lopez Hernandez, J.C.2    Menezes, A.J.3
  • 8
    • 0030172012 scopus 로고    scopus 로고
    • Analyzing and Comparing Montgomery Multiplication Algorithms
    • Koç, Ç. K., Acar, T., Kaliski, B.S.: Analyzing and Comparing Montgomery Multiplication Algorithms. IEEE Micro 16(3) (1996) 26-33
    • (1996) IEEE Micro , vol.16 , Issue.3 , pp. 26-33
    • Koç, Ç.K.1    Acar, T.2    Kaliski, B.S.3
  • 9
    • 84957812088 scopus 로고    scopus 로고
    • Selecting Cryptographic Key Sizes
    • Imai, H., Zheng, Y. (eds.): Public Key Cryptography PKC 2000. Springer Verlag, Berlin Germany
    • Lenstra A. K. and Verheul E. R.: Selecting Cryptographic Key Sizes. In: Imai, H., Zheng, Y. (eds.): Public Key Cryptography PKC 2000. Lecture Notes in Computer Science, Vol. 1751. Springer Verlag, Berlin Germany (2000) 446-465
    • (2000) Lecture Notes in Computer Science , vol.1751 , pp. 446-465
    • Lenstra, A.K.1    Verheul, E.R.2
  • 10
    • 84947913604 scopus 로고    scopus 로고
    • m) Without Precomputation
    • Koç, Ç. K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems -CHES '99. Springer Verlag, Berlin Germany
    • m) Without Precomputation. In Koç, Ç. K., Paar, C. (eds.): Cryptographic Hardware and Embedded Systems -CHES '99. Lecture Notes in Computer Science, Vol. 1717. Springer Verlag, Berlin Germany (1999) 316-327
    • (1999) Lecture Notes in Computer Science , vol.1717 , pp. 316-327
    • López, J.1    Dahab, R.2
  • 11
    • 84968484435 scopus 로고
    • Speeding the Pollard and Elliptic Curve Methods of Factorization
    • Montgomery, P.L.: Speeding the Pollard and Elliptic Curve Methods of Factorization. Mathematics of Computation 48(177) (1987) 243-264
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 15
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public Key Cryptosystems
    • Rivest, R.L., Shamir, A, Adleman, L.M.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21(2) (1978) 120-126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.