-
1
-
-
84894201826
-
A survey on elliptic curve cryptography (ECC)
-
Dr
-
Sonali U. Nimbhorkar, and Dr L. G. Malik. "A Survey On Elliptic Curve Cryptography (ECC)," International Journal of Advanced Studies in Computers, Science and Engineering Vol. 1, 2012, issue 1 pp. 1-5.
-
(2012)
International Journal of Advanced Studies in Computers, Science and Engineering
, vol.1
, Issue.1
, pp. 1-5
-
-
Nimbhorkar, S.U.1
Malik, L.G.2
-
2
-
-
70350527706
-
-
[online] Sep 19, 2011, (Accessed: 25 Jun 2013)
-
Certicom research. "The elliptic curve cryptosystem,". Retrived from htttp://www.certicom.com. [online] Sep 19, 2011, (Accessed: 25 Jun 2013).
-
The Elliptic Curve Cryptosystem
-
-
-
3
-
-
84871750400
-
Smartphone security challenges
-
58, Dec.
-
Yong Wang; Streff, K.; Raman, S., "Smartphone Security Challenges," Computer, Vol. 45, no. 12, pp. 52, 58, Dec. 2012.
-
(2012)
Computer
, vol.45
, Issue.12
, pp. 52
-
-
Wang, Y.1
Streff, K.2
Raman, S.3
-
4
-
-
84863946504
-
Issues in elliptic curve cryptography implementation
-
Paryasto, M., Kuspriyanto, Sutikno, S. and Sasongko, A., Issues in elliptic curve cryptography implementation. Internetworking Indonesia Journal. 1(1):29-33, 2009.
-
(2009)
Internetworking Indonesia Journal
, vol.1
, Issue.1
, pp. 29-33
-
-
Paryasto, M.1
Kuspriyanto2
Sutikno, S.3
Sasongko, A.4
-
5
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
LNCS, 1965
-
Hankerson, D., Lòpez Hernandez, J. and Menezes, A., Software implementation of elliptic curve cryptography over binary fields. Cryptographic Hardware and Embedded Systems, CHES'00. LNCS, 1965:1-24, 2000.
-
(2000)
Cryptographic Hardware and Embedded Systems, CHES'00
, pp. 1-24
-
-
Hankerson, D.1
Lòpez Hernandez, J.2
Menezes, A.3
-
6
-
-
54049086892
-
High-performance architecture of elliptic curve scalar multiplication
-
1453
-
Ansari, B.; Hasan, M.A. "High-Performance Architecture of Elliptic Curve Scalar Multiplication," Computers, IEEE Transactions, Vol. 57, no. 11, pp. 1443, 1453, 2008.
-
(2008)
Computers, IEEE Transactions
, vol.57
, Issue.11
, pp. 1443
-
-
Ansari, B.1
Hasan, M.A.2
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir and L. Adleman. "A method for obtaining digital signatures and public-key cryptosystems," Comm. ACM, 21, pp. 120-126, 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
9
-
-
84943632039
-
Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
-
Springer-Verlag
-
P. Kocher. "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems," Advances in Cryptology: Proceeding of CRYPTO '96, Springer-Verlag, pp. 104-113., 1996.
-
(1996)
Advances in Cryptology: Proceeding of CRYPTO '96
, pp. 104-113
-
-
Kocher, P.1
-
10
-
-
84984600975
-
Serious security weakness in RSA cryptosystem
-
No 3
-
Majid Bakhtiari, Mohd Aizaini Maarof. "Serious Security Weakness in RSA Cryptosystem," IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, 2012.
-
(2012)
IJCSI International Journal of Computer Science Issues
, vol.9
, Issue.1
-
-
Bakhtiari, M.1
Maarof, M.A.2
-
11
-
-
37249085572
-
-
LNCS. 4577
-
Wang, B., Zhang, H., Wang, Z., & Wang, Y. "Speeding up scalar multiplication using a new signed binary representation for integers,". LNCS. 4577, 277-285, 2007.
-
(2007)
Speeding Up Scalar Multiplication Using a New Signed Binary Representation for Integers
, pp. 277-285
-
-
Wang, B.1
Zhang, H.2
Wang, Z.3
Wang, Y.4
-
12
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N. Elliptic curve cryptosystems. Mathematics of computation. No. 48, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, Issue.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0034462158
-
Elliptic curve cryptosystem
-
Torri, N. and Yokoyama, K. Elliptic Curve Cryptosystem. FUJITSU Sci. Tech. J., 36(2):140-146, 2000.
-
(2000)
FUJITSU Sci. Tech. J.
, vol.36
, Issue.2
, pp. 140-146
-
-
Torri, N.1
Yokoyama, K.2
-
14
-
-
35048831549
-
Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card
-
Hitchcock, Y., Dawson, E., Clark, A. and Montague, P. Implementing an efficient elliptic curve cryptosystem over GF(p) on a smart card. ANZIAM J. 44(E):C354-C377, 2003.
-
(2003)
ANZIAM J.
, vol.44
, Issue.E
-
-
Hitchcock, Y.1
Dawson, E.2
Clark, A.3
Montague, P.4
-
15
-
-
1842715081
-
The advantages of elliptic curve cryptography for wireless security
-
Lauter, K. The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications. pp. 62-67, 2004.
-
(2004)
IEEE Wireless Communications
, pp. 62-67
-
-
Lauter, K.1
-
16
-
-
9144256251
-
Efficient implementation of elliptic curve cryptography (ECC) for personal digital assistants (PDAs)
-
Dabholkar, A. Yow, K.C. "Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs), Wireless Personal Communications - WIREL PERS COMMUN,", Vol. 29, pp. 233-246, 2004.
-
(2004)
Wireless Personal Communications - WIREL PERS COMMUN
, vol.29
, pp. 233-246
-
-
Dabholkar, A.1
Yow, K.C.2
-
17
-
-
34247219909
-
A fast elliptic curve based key agreement protocol-on-chip (PoC) for securing networked embedded systems
-
Roshan Duraisamy; Salcic, Z.; Morales-Sandoval, M.; Feregrino-Uribe, C. "A Fast Elliptic Curve Based Key Agreement Protocol-on-Chip (PoC) for Securing Networked Embedded Systems," Embedded and Real-Time Computing Systems and Applications. Proceedings. 12th IEEE International Conference, pp. 154, 2006.
-
(2006)
Embedded and Real-Time Computing Systems and Applications. Proceedings. 12th IEEE International Conference
, pp. 154
-
-
Duraisamy, R.1
Salcic, Z.2
Morales-Sandoval, M.3
Feregrino-Uribe, C.4
-
18
-
-
70350679379
-
-
(nsa.gov), [online] Jan 15 (Accessed: 20 July 2013)
-
National Security Agency., "The Case for Elliptic Curve Cryptography,", (nsa.gov), [online] Jan 15, 2009, http://www.nsa.gov/ business/programs/elliptic-curve.shtml, (Accessed: 20 July 2013)
-
(2009)
The Case for Elliptic Curve Cryptography
-
-
|