-
1
-
-
77950341323
-
Security issues in electronics: A close look at RSA and elliptic curve cryptographic algorithms
-
Adewumi, A. O., Longe, H. O. D., Uwadia, C. O., & James, T. Y. (2000). Security issues in electronics: a close look at RSA and elliptic curve cryptographic algorithms. In Proceedings of the 16th national conference of the computer association of Nigeria (COAN) on deployment of telematics systems: trends, techniques and tools (Telematics 2000). COAN Conference Series (Vol. 11, pp. 187-202).
-
(2000)
Proceedings of the 16th National Conference of the Computer Association of Nigeria (COAN) on Deployment of Telematics Systems: Trends, Techniques and Tools (Telematics 2000). COAN Conference Series
, vol.11
, pp. 187-202
-
-
Adewumi, A.O.1
Longe, H.O.D.2
Uwadia, C.O.3
James, T.Y.4
-
2
-
-
77950339637
-
Digital comparison of elliptic curve and RSA public-key cryptosystems
-
Akinwande, M. B. O., Idowu, B. A., Olaitan, H. M., & Ogungbe, A. S. (2006). Digital comparison of elliptic curve and RSA public-key cryptosystems. Journal of Computer Science and its Applications, 12(1), 91-99.
-
(2006)
Journal of Computer Science and Its Applications
, vol.12
, Issue.1
, pp. 91-99
-
-
Akinwande, M.B.O.1
Idowu, B.A.2
Olaitan, H.M.3
Ogungbe, A.S.4
-
4
-
-
0027005999
-
Achieving electronic privacy
-
Chaum, D. (1992). Achieving electronic privacy. Scientific American, 4, 96-101.
-
(1992)
Scientific American
, vol.4
, pp. 96-101
-
-
Chaum, D.1
-
5
-
-
77950341352
-
An implementation of fast algorithm for Elliptic Curve Cryptosystem over GF(p)
-
Chen, L., Yanpu, C., & Zhengzhong, B. (2004). An implementation of fast algorithm for Elliptic Curve Cryptosystem over GF(p). Journal of Electronics, 21(4), 346-352.
-
(2004)
Journal of Electronics
, vol.21
, Issue.4
, pp. 346-352
-
-
Chen, L.1
Yanpu, C.2
Zhengzhong, B.3
-
6
-
-
33745212646
-
Performance analysis of TLS web servers
-
Coarfa, C., Druschel, P., & Wallach, D. (2006). Performance analysis of TLS web servers. ACM Transactions on Computer Systems (TOCS), 24(1), 39-69.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.1
, pp. 39-69
-
-
Coarfa, C.1
Druschel, P.2
Wallach, D.3
-
8
-
-
0003355701
-
Hypertext transfer protocol-HTTP/1.1
-
Fielding, R., et al. (1999). Hypertext transfer protocol-HTTP/1. 1. RFC 2616.
-
(1999)
RFC 2616
-
-
Fielding, R.1
-
9
-
-
58149498666
-
Some ways to secure Elliptic Curve Cryptosystem
-
Hedabou, M., Beneteaus, L., & Pinel, P. (2008). Some ways to secure Elliptic Curve Cryptosystem. Advances in Applied Clifford Algorithm, 18, 677-688.
-
(2008)
Advances in Applied Clifford Algorithm
, vol.18
, pp. 677-688
-
-
Hedabou, M.1
Beneteaus, L.2
Pinel, P.3
-
10
-
-
51949093954
-
A novel protocol for smart card using ECDLP
-
Los Alamitos: IEEE Computer Society
-
Jena, J., Pornography, S. K., Biswal, P. K., & Jena, S. K. (2008). A novel protocol for smart card using ECDLP. In 1st International conference on emerging trends in engineering and technology (pp. 838-843). Los Alamitos: IEEE Computer Society.
-
(2008)
1st International Conference on Emerging Trends in Engineering and Technology
, pp. 838-843
-
-
Jena, J.1
Pornography, S.K.2
Biswal, P.K.3
Jena, S.K.4
-
11
-
-
0031655520
-
Market-based resource control for mobile agents
-
Jonathan, B., David, K., & Daniela, R. (1998). Market-based resource control for mobile agents. Proceedings of Autonomous Agents, 197-204.
-
(1998)
Proceedings of Autonomous Agents
, pp. 197-204
-
-
Jonathan, B.1
David, K.2
Daniela, R.3
-
12
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, N. (1987). Elliptic Curve Cryptosystems. Mathematics of Computations, 48, 203-209.
-
(1987)
Mathematics of Computations
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
14
-
-
40049108451
-
A practical SSL server performance improvement algorithm based on batch RSA decryption
-
Li, S., Wu, Y., Zhou, J., & Chen, K. (2008). A practical SSL server performance improvement algorithm based on batch RSA decryption. Journal of Shanghai Jiaotong University (Science), 13(1), 67-70.
-
(2008)
Journal of Shanghai Jiaotong University (Science)
, vol.13
, Issue.1
, pp. 67-70
-
-
Li, S.1
Wu, Y.2
Zhou, J.3
Chen, K.4
-
15
-
-
46849093641
-
New schemes for sharing points on an elliptic curve
-
Liu, D., Huang, D., Luo, P., & Dai, Y. (2008). New schemes for sharing points on an elliptic curve. Computers and Mathematics with Applications, 56, 1556-1561.
-
(2008)
Computers and Mathematics with Applications
, vol.56
, pp. 1556-1561
-
-
Liu, D.1
Huang, D.2
Luo, P.3
Dai, Y.4
-
18
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes, A., Okamoto, T., & Vanstone, S. (1993). Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory, 39, 1639-1646.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
19
-
-
85015402934
-
Use of elliptic curve in cryptography
-
Lecture notes in computer sciences, New York: Springer
-
Miller, V. S. (1986). Use of elliptic curve in cryptography. In Lecture notes in computer sciences: Vol. 218. Advances in Cryptography. Proceedings of CRYPTO'85 (pp. 417-426). New York: Springer.
-
(1986)
Advances in Cryptography. Proceedings of CRYPTO'85
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
21
-
-
77950339577
-
Implementation of elliptic curve signature algorithm
-
Olorunfemi, T. O. S., Alese, B. K., Falaki, S. O., & Fajuyigbe, O. (2007). Implementation of elliptic curve signature algorithm. Journal of Software Engineering, 1(1), 1-12.
-
(2007)
Journal of Software Engineering
, vol.1
, Issue.1
, pp. 1-12
-
-
Olorunfemi, T.O.S.1
Alese, B.K.2
Falaki, S.O.3
Fajuyigbe, O.4
-
22
-
-
0003367568
-
S/MIME version 3 message specification
-
Ramsdell, B. (1999). S/MIME version 3 message specification. RFC 2633.
-
(1999)
RFC 2633
-
-
Ramsdell, B.1
-
23
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
24
-
-
77950342061
-
Software implementations of Elliptic Curve Cryptography
-
Shi, Z. J., & Yan, H. (2008). Software implementations of Elliptic Curve Cryptography. International Journal of Network Security, 7(1), 141-150.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.1
, pp. 141-150
-
-
Shi, Z.J.1
Yan, H.2
-
25
-
-
0003539458
-
The discrete logarithm problem on elliptic curves of trace one
-
Smart, N. P. (1999). The discrete logarithm problem on elliptic curves of trace one. Journal of Cryptology, 12(3), 193-196.
-
(1999)
Journal of Cryptology
, vol.12
, Issue.3
, pp. 193-196
-
-
Smart, N.P.1
-
26
-
-
84925130682
-
-
Cambridge: Cambridge University Press. ISBN978-0-521-85231-9
-
Talbot, J., & Welsh, D. (2006). Complexity and cryptography. Cambridge: Cambridge University Press. ISBN978-0-521-85231-9.
-
(2006)
Complexity and Cryptography
-
-
Talbot, J.1
Welsh, D.2
-
27
-
-
77950340694
-
Secure localization using Elliptic Curve Cryptography in wireless sensor networks
-
Vijayalakshmi, V., & Palanivelu, T. G. (2008). Secure localization using Elliptic Curve Cryptography in wireless sensor networks. International Journal of Computer Sciences and Network Security, 8(6), 255-261.
-
(2008)
International Journal of Computer Sciences and Network Security
, vol.8
, Issue.6
, pp. 255-261
-
-
Vijayalakshmi, V.1
Palanivelu, T.G.2
-
28
-
-
78549283709
-
Elliptic Curve Cryptography
-
Vivek, K., Vivek, S. A., & Ramesh, S. (2008). Elliptic Curve Cryptography. ACM Ubiquity, 9(20), 1-8.
-
(2008)
ACM Ubiquity
, vol.9
, Issue.20
, pp. 1-8
-
-
Vivek, K.1
Vivek, S.A.2
Ramesh, S.3
-
29
-
-
26844481921
-
-
Berlin, Heidelberg: Springer
-
Lin, X., Wong, J. W., & Kou, W. (2000). Performance analysis of secure web server based on SSL (pp. 249-261). Berlin, Heidelberg: Springer.
-
(2000)
Performance Analysis of Secure Web Server Based on SSL
-
-
Lin, X.1
Wong, J.W.2
Kou, W.3
-
30
-
-
0343762482
-
SSH protocol architecture
-
Ylonen, T., Kivinen, T., Saarinen, M., Rinne, T., & Lehtinen, S. (2003). SSH protocol architecture. IETF Internet.
-
(2003)
IETF Internet
-
-
Ylonen, T.1
Kivinen, T.2
Saarinen, M.3
Rinne, T.4
Lehtinen, S.5
-
31
-
-
77950338363
-
The need for speed II
-
Zona Research
-
Zona Research (2001). The need for speed II. Zona Market Bulletin, (5), 4-8.
-
(2001)
Zona Market Bulletin
, Issue.5
, pp. 4-8
-
-
|