메뉴 건너뛰기




Volumn , Issue , 2002, Pages 127-137

Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CHARACTERIZATION; CURVE FITTING; DATA PRIVACY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; GEOMETRY; HASH FUNCTIONS; NETWORK SECURITY; OPTIMIZATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 84962855303     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WWC.2002.1226501     Document Type: Conference Paper
Times cited : (22)

References (23)
  • 1
    • 0040518412 scopus 로고    scopus 로고
    • Overview of Elliptic Curve Cryptography
    • H. Imai and Y. Zheng, eds., Springer-Verlag
    • Araki, Kiyomichi, Takakazu Satoh, and Shinji Miura, "Overview of Elliptic Curve Cryptography," Public Key Cryptography, H. Imai and Y. Zheng, eds., pp. 29-48, Springer-Verlag, 1998.
    • (1998) Public Key Cryptography , pp. 29-48
    • Araki, K.1    Satoh, T.2    Miura, S.3
  • 4
    • 84874800178 scopus 로고
    • A Public-key Cryptosystem and a Signature Scheme based on Discrete Logarithm
    • ElGamal, T., "A Public-key Cryptosystem and a Signature Scheme based on Discrete Logarithm," IEEE Transactions on Info Theory, 31:469-472, 1985.
    • (1985) IEEE Transactions on Info Theory , vol.31 , pp. 469-472
    • ElGamal, T.1
  • 5
    • 0035449334 scopus 로고    scopus 로고
    • Streaming Technology in 3G Mobile Communication Systems
    • September
    • Elsen, I., F. Hartung, U. Horn, M. Kampmann and L. Peters, "Streaming Technology in 3G Mobile Communication Systems," IEEE Computer, vol. 34, no. 9, pp. 46-52, September 2001.
    • (2001) IEEE Computer , vol.34 , Issue.9 , pp. 46-52
    • Elsen, I.1    Hartung, F.2    Horn, U.3    Kampmann, M.4    Peters, L.5
  • 10
    • 84968503742 scopus 로고
    • Elliptic Curve Cryptosystems
    • Koblitz, Neal, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 13
    • 84962784049 scopus 로고    scopus 로고
    • Lee, Ruby B., et al., Princeton Architecture Laboratory for Multimedia and Security (PALMS), http://palms.ee.princeton.edu.
    • Lee, R.B.1
  • 16
    • 85015402934 scopus 로고
    • Use of Elliptic Curves in Cryptography
    • Springer-Verlag
    • Miller, Victor S., "Use of Elliptic Curves in Cryptography," Lecture Notes in Computer Science, no. 218, pp. 417-426, Springer-Verlag, 1986.
    • (1986) Lecture Notes in Computer Science , Issue.218 , pp. 417-426
    • Miller, V.S.1
  • 23
    • 84957657892 scopus 로고
    • Fast Key Exchange with Elliptic Curve Systems
    • Advances in Cryptology - CRYPTO'95, Springer-Verlag
    • Schroeppel, R., H. Orman, S. O'Malley and O. Spatscheck, "Fast Key Exchange with Elliptic Curve Systems," Advances in Cryptology - CRYPTO'95, Lecture Notes in Computer Science, pp. 43-56, Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science , pp. 43-56
    • Schroeppel, R.1    Orman, H.2    O'Malley, S.3    Spatscheck, O.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.