-
1
-
-
0040518412
-
Overview of Elliptic Curve Cryptography
-
H. Imai and Y. Zheng, eds., Springer-Verlag
-
Araki, Kiyomichi, Takakazu Satoh, and Shinji Miura, "Overview of Elliptic Curve Cryptography," Public Key Cryptography, H. Imai and Y. Zheng, eds., pp. 29-48, Springer-Verlag, 1998.
-
(1998)
Public Key Cryptography
, pp. 29-48
-
-
Araki, K.1
Satoh, T.2
Miura, S.3
-
3
-
-
0017018484
-
New Directions in Cryptography
-
November
-
Diffie, Whitfield, M. E. Hellman "New Directions in Cryptography," IEEE Transactions on Information Theory - IT-22, no. 6, pp. 644-654, November. 1976.
-
(1976)
IEEE Transactions on Information Theory - IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
84874800178
-
A Public-key Cryptosystem and a Signature Scheme based on Discrete Logarithm
-
ElGamal, T., "A Public-key Cryptosystem and a Signature Scheme based on Discrete Logarithm," IEEE Transactions on Info Theory, 31:469-472, 1985.
-
(1985)
IEEE Transactions on Info Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
5
-
-
0035449334
-
Streaming Technology in 3G Mobile Communication Systems
-
September
-
Elsen, I., F. Hartung, U. Horn, M. Kampmann and L. Peters, "Streaming Technology in 3G Mobile Communication Systems," IEEE Computer, vol. 34, no. 9, pp. 46-52, September 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.9
, pp. 46-52
-
-
Elsen, I.1
Hartung, F.2
Horn, U.3
Kampmann, M.4
Peters, L.5
-
10
-
-
84968503742
-
Elliptic Curve Cryptosystems
-
Koblitz, Neal, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
84962784049
-
-
Lee, Ruby B., et al., Princeton Architecture Laboratory for Multimedia and Security (PALMS), http://palms.ee.princeton.edu.
-
-
-
Lee, R.B.1
-
14
-
-
84895373064
-
Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments
-
July
-
Lee, Ruby B., A. Murat Fiskiran, Zhijie Shi and Xiao Yang, "Refining Instruction Set Architecture for High-Performance Multimedia Processing in Constrained Environments," Proceedings of the 13th International Conference on Application-specific Systems, Architectures and Processors (ASAP 2002), pp. 253-264, July 2002.
-
(2002)
Proceedings of the 13th International Conference on Application-specific Systems, Architectures and Processors (ASAP 2002)
, pp. 253-264
-
-
Lee, R.B.1
Fiskiran, A.M.2
Shi, Z.3
Yang, X.4
-
15
-
-
84944878354
-
-
CRC Press, October
-
Menezes, Alfred J., Paul C. Van Oorschot and Scott A. Vanstone, "Handbook of Applied Cryptography," CRC Press, ISBN 0-8493-8523-7, October 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
16
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Springer-Verlag
-
Miller, Victor S., "Use of Elliptic Curves in Cryptography," Lecture Notes in Computer Science, no. 218, pp. 417-426, Springer-Verlag, 1986.
-
(1986)
Lecture Notes in Computer Science
, Issue.218
, pp. 417-426
-
-
Miller, V.S.1
-
23
-
-
84957657892
-
Fast Key Exchange with Elliptic Curve Systems
-
Advances in Cryptology - CRYPTO'95, Springer-Verlag
-
Schroeppel, R., H. Orman, S. O'Malley and O. Spatscheck, "Fast Key Exchange with Elliptic Curve Systems," Advances in Cryptology - CRYPTO'95, Lecture Notes in Computer Science, pp. 43-56, Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.3
Spatscheck, O.4
|