-
1
-
-
0036814427
-
Image encryption techniques: A survey
-
in Chinese
-
C.-G. Li and Z.-Z. Han, "Image encryption techniques: a survey," J. Comput. Res. Dev. 39(10), 1317-1324 (2002) (in Chinese).
-
(2002)
J. Comput. Res. Dev
, vol.39
, Issue.10
, pp. 1317-1324
-
-
Li, C.-G.1
Han, Z.-Z.2
-
3
-
-
33845707856
-
Efficient generation of secure elliptic curves
-
E. Konstantinou, Y. C. Stamatiou, and C. Zaroliagis, "Efficient generation of secure elliptic curves," Int. J. Inf. Secur. 6, 47-63 (2007).
-
(2007)
Int. J. Inf. Secur
, vol.6
, pp. 47-63
-
-
Konstantinou, E.1
Stamatiou, Y.C.2
Zaroliagis, C.3
-
4
-
-
84875602340
-
-
J.-S. Jiang and D.-L. Zeng, Digital image encryption technology based on ECC, J. Microprocessor Appl. 23(5), 50-52 (2004) (in Chinese).
-
J.-S. Jiang and D.-L. Zeng, "Digital image encryption technology based on ECC," J. Microprocessor Appl. 23(5), 50-52 (2004) (in Chinese).
-
-
-
-
5
-
-
70350705370
-
A new image encryption algorithm based, on Logistic chaotic sequence
-
in Chinese
-
L.-P. Su, "A new image encryption algorithm based, on Logistic chaotic sequence," J. Comput. Inf. Technol. 14(5), 26-28 (2006) (in Chinese).
-
(2006)
J. Comput. Inf. Technol
, vol.14
, Issue.5
, pp. 26-28
-
-
Su, L.-P.1
-
6
-
-
70350704253
-
The study and accomplishment of elliptic curve coding algorithm
-
in Chinese
-
H.-B. Zhang and A.-F. Hao, "The study and accomplishment of elliptic curve coding algorithm," J. Xinzhou Teachers Univ. 22(2), 71-74 (2006) (in Chinese).
-
(2006)
J. Xinzhou Teachers Univ
, vol.22
, Issue.2
, pp. 71-74
-
-
Zhang, H.-B.1
Hao, A.-F.2
-
7
-
-
0348003132
-
The state of ellipticcurve cryptography
-
N. Koblitz, A. Menezes, and S. Vanstone, "The state of ellipticcurve cryptography," Designs, Codes, Cryptogr. 19, 173-193 (2002).
-
(2002)
Designs, Codes, Cryptogr
, vol.19
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.3
-
8
-
-
78651268569
-
Research and application of elliptic curve encryption system, J
-
in Chinese
-
W.-B. Zheng, "Research and application of elliptic curve encryption system," J. Fujian Comput. 20(10), 22-23 (2005) (in Chinese).
-
(2005)
Fujian Comput
, vol.20
, Issue.10
, pp. 22-23
-
-
Zheng, W.-B.1
-
9
-
-
0003987443
-
-
2nd ed, Beijing, Publishing House of Electronics Industry , in Chinese
-
D. R. Stinson, Cryptography Theory and Practice, 2nd ed., Beijing, Publishing House of Electronics Industry (2003) (in Chinese).
-
(2003)
Cryptography Theory and Practice
-
-
Stinson, D.R.1
-
10
-
-
70350709549
-
The elliptic curve encryption accomplish of image security
-
in Chinese
-
C.-J. Lu and H.-Y. Zhou, "The elliptic curve encryption accomplish of image security," J. Shandong Univ. 34(3), 33-36 (2004) (in Chinese).
-
(2004)
J. Shandong Univ
, vol.34
, Issue.3
, pp. 33-36
-
-
Lu, C.-J.1
Zhou, H.-Y.2
-
11
-
-
70350718736
-
The implementation and instance analysis of elliptic curve cryptography
-
in Chinese
-
J.-F. Li, "The implementation and instance analysis of elliptic curve cryptography," J. Network Security Technol. Appl. 4(11), 56-58 (2004) (in Chinese).
-
(2004)
J. Network Security Technol. Appl
, vol.4
, Issue.11
, pp. 56-58
-
-
Li, J.-F.1
-
12
-
-
0034202587
-
Point choosing algorithm, of ECC
-
in Chinese
-
C. Lu and Q.-W. Zhou, "Point choosing algorithm, of ECC," J. Xi'an Jiaotong Univ. 6(34), 27-30 (2000) (in Chinese).
-
(2000)
J. Xi'an Jiaotong Univ
, vol.6
, Issue.34
, pp. 27-30
-
-
Lu, C.1
Zhou, Q.-W.2
-
13
-
-
70350718737
-
The research on technical advantages of ECC
-
in Chinese
-
X.-Z. Xiao and Y. Zhao, "The research on technical advantages of ECC," J. Comput. Sci. 30(1.0), 181-183 (2003) (in Chinese).
-
(2003)
J. Comput. Sci
, vol.30
, Issue.1 .0
, pp. 181-183
-
-
Xiao, X.-Z.1
Zhao, Y.2
-
14
-
-
58349102728
-
Security analyses of elliptic curve crypto system
-
in Chinese
-
P. Liu and L.-Y. Teng, "Security analyses of elliptic curve crypto system," J. Comput. Eng. Des. 27(16), 2943-2945 (2006) (in Chinese).
-
(2006)
J. Comput. Eng. Des
, vol.27
, Issue.16
, pp. 2943-2945
-
-
Liu, P.1
Teng, L.-Y.2
-
15
-
-
29644436612
-
-
E. Teske, An elliptic curve trapdoor system, J. Cryptology 19, 11.5133 (2006).
-
E. Teske, "An elliptic curve trapdoor system," J. Cryptology 19, 11.5133 (2006).
-
-
-
-
16
-
-
33750086427
-
The new evolution of image encryption techniques
-
in Chinese
-
C.-G. Li and Z.-Z. Han, "The new evolution of image encryption techniques," J. Inf. Control 32(4), 339-343 (2003) (in Chinese).
-
(2003)
J. Inf. Control
, vol.32
, Issue.4
, pp. 339-343
-
-
Li, C.-G.1
Han, Z.-Z.2
-
17
-
-
70350740776
-
Exploring image encryption techniques
-
in. Chinese
-
T. Chen, G.-P. Jiang, and A.-J. Quan, "Exploring image encryption techniques," J. China Inf. Security 27(1), 57-59 (2005) (in. Chinese).
-
(2005)
J. China Inf. Security
, vol.27
, Issue.1
, pp. 57-59
-
-
Chen, T.1
Jiang, G.-P.2
Quan, A.-J.3
-
18
-
-
85051957757
-
A brief review on security of digital image
-
in Chinese
-
X.-S. Huang, "A brief review on security of digital image," J. East China Jiaotong Univ. 23(1), 82-85 (2006) (in Chinese).
-
(2006)
J. East China Jiaotong Univ
, vol.23
, Issue.1
, pp. 82-85
-
-
Huang, X.-S.1
|