-
1
-
-
79960915169
-
Elliptic curve cryptography and its applications
-
May, WOSSPA'11
-
Amara, Moncef, and Amar Siad. Elliptic Curve Cryptography and its applications. In 7th International Workshop on Systems, Signal Processing and their Applications, (May 2011), 247-250, WOSSPA'11.
-
(2011)
7th International Workshop on Systems, Signal Processing and Their Applications
, pp. 247-250
-
-
Amara, M.1
Siad, A.2
-
2
-
-
84894145953
-
Comparison of ECC and RSA algorithm in resource constrained devices
-
Nov, ICITCS'13
-
Bafandehkar, Mohsen, Sharifah Md Yasin, Ramlan Mahmod, and Zurina Mohd Hanapi. Comparison of ECC and RSA Algorithm in Resource Constrained Devices. In IEEE International Conference on IT Convergence and Security, (Nov 2013), 1-3, ICITCS'13.
-
(2013)
IEEE International Conference on IT Convergence and Security
, pp. 1-3
-
-
Mohsen, B.1
Md Yasin, S.2
Mahmod, R.3
Mohd Hanapi, Z.4
-
4
-
-
84884387687
-
Achieving efficient cooperative message authentication in vehicular ad hoc networks
-
September
-
Lin, Xiaodong, and Xu Li. Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 62, 7 (September 2013), 3339-3348.
-
(2013)
IEEE Transactions on Vehicular Technology
, vol.62
, Issue.7
, pp. 3339-3348
-
-
Lin, X.1
Li, X.2
-
5
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes A., Okamoto T., Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory, 5, 3, (1993) 1639-1646.
-
(1993)
IEEE Transactions on Information Theory
, vol.5
, Issue.3
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
7
-
-
33845726678
-
Securing vehicular ad hoc networks
-
Raya, Maxim, and Jean-Pierre Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security, 15, 1 (2007), 39-68.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Maxim, R.1
Hubaux, J.2
-
8
-
-
84892424414
-
VSPN: VANET based secure and privacy-preserving navigation
-
Feb
-
T.W. Chim et.al. VSPN: VANET based Secure and Privacy-Preserving Navigation. IEEE Transactions on Computers, 63, 2, (Feb 2014), 510-524.
-
(2014)
IEEE Transactions on Computers
, vol.63
, Issue.2
, pp. 510-524
-
-
Chim, T.W.1
-
9
-
-
51249100419
-
RAISE: An efficient RSU-aided message authentication scheme in vehicular communication networks
-
May, ICC'08
-
C. Zhang et. al. RAISE: an efficient RSU-aided message authentication scheme in vehicular communication networks. In IEEE International Conference on Communications, 1451-1457, (May 2008), ICC'08.
-
(2008)
IEEE International Conference on Communications
, pp. 1451-1457
-
-
Zhang, C.1
-
10
-
-
84896875258
-
Efficient privacy-preserving authentication for vehicular ad hoc networks
-
Feb
-
Zhu, Xiaoyan, Shunrong Jiang, Liangmin Wang, and Hui Li. Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks. IEEE Transactions on Vehicular Technology, 63, 2, (Feb 2014), 907-919.
-
(2014)
IEEE Transactions on Vehicular Technology
, vol.63
, Issue.2
, pp. 907-919
-
-
Zhu, X.1
Jiang, S.2
Wang, L.3
Li, H.4
-
12
-
-
84969831965
-
-
http://www.cryptopp.com/benchmarks.html
-
-
-
-
13
-
-
70350679379
-
-
National Security Agency, (nsa.gov), [online] Jan 15
-
National Security Agency., "The Case for Elliptic Curve Cryptography", (nsa.gov), [online] Jan 15, 2009, http://www.nsa.gov/business/programs/elliptic-curve.shtml
-
(2009)
The Case for Elliptic Curve Cryptography
-
-
|