-
4
-
-
84875997854
-
Implementation ofeiliptic curve digital signature algorithm
-
A. Khalique, K. Singh, S. Sood, "Implementation ofEIliptic Curve Digital Signature Algorithm". International Journal of Computer Applications, Volume 2, No.2, 2010.
-
(2010)
International Journal of Computer Applications
, vol.2
, Issue.2
-
-
Khalique, A.1
Singh, K.2
Sood, S.3
-
5
-
-
84868563226
-
Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves
-
G. Nabil, K. Naziha, F. Lamia, K. Lotfi, "Hardware implementation of elliptic curve digital signature algorithm (ECDSA) on Koblitz curves". Communication Systems, IEEE Networks & Digital Signal Processing (CSNDSP), 8th International Symposium on, pp.I-6, 2012.
-
(2012)
Communication Systems, IEEE Networks & Digital Signal Processing (CSNDSP), 8th International Symposium on
, pp. I-6
-
-
Nabil, G.1
Naziha, K.2
Lamia, F.3
Lotfi, K.4
-
6
-
-
29344447400
-
-
Bruce Schneier
-
Bruce Schneier, "Schneier on Security", 2005. http://www.schneier.com/blog/ archives/2005/02/shal-broken.html
-
(2005)
Schneier on Security
-
-
-
7
-
-
85018405727
-
-
The PIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS)
-
The PIPS 186-4 Elliptic Curve Digital Signature Algorithm Validation System (ECDSA2VS), 2014.
-
(2014)
-
-
-
8
-
-
84961774302
-
Dummy operations in scalar multiplication over elliptic curves: A tradeoffbetween security and performance
-
S. Pontie, P. Maistri, R. Leveugle, "Dummy operations in scalar multiplication over elliptic curves: A tradeoffbetween security and performance". Journal Microprocessors and Microsystems, pp.I-14, 2016
-
(2016)
Journal Microprocessors and Microsystems
, pp. I-14
-
-
Pontie, S.1
Maistri, P.2
Leveugle, R.3
-
11
-
-
70349717377
-
Architectural design features of a programmable high throughput reconfigurable SHA-2 Processor
-
M. Zeghid, B. Bouallegue, M. Machhout, A. baganne, R. Tourki, "Architectural design features of a programmable high throughput reconfigurable SHA-2 Processor". Journal oflnformation Assurance and Security, pp.147-158, (2008).
-
(2008)
Journal Oflnformation Assurance and Security
, pp. 147-158
-
-
Zeghid, M.1
Bouallegue, B.2
Machhout, M.3
Baganne, A.4
Tourki, R.5
-
12
-
-
84886703527
-
Grain: A stream cipher for constrained environments
-
M. Hell, T. Johansson, W. Meier, "Grain: a stream cipher for constrained environments". International Journal of Wireless and Mobile Computing archive, Volume 2 Issue 1, pp.86-93, 2007.
-
(2007)
International Journal of Wireless and Mobile Computing Archive
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
13
-
-
33747067531
-
Public key cryptography for the financial service industry: The elliptic curve digital signature algorithm (ecdsa)
-
ANSI X9.62-2005,16 novembre
-
ANSI X9.62-2005, "Public Key Cryptography for The Financial Service Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)". American National Standards Institute, 16 novembre 2005.
-
(2005)
American National Standards Institute
-
-
-
14
-
-
84946224619
-
Hardware-software codesign of elliptic curve digital signature algorithm over binary fields
-
1101-lI06
-
B. Panjwani, D. C. Mehta, "Hardware-software codesign of elliptic curve digital signature algorithm over binary fields". IEEE conference, Advances in Computing, Communications and Informatics (lCACCI), pp.1101-lI06,2015.
-
(2015)
IEEE Conference, Advances in Computing, Communications and Informatics (LCACCI)
-
-
Panjwani, B.1
Mehta, D.C.2
-
15
-
-
85018445280
-
Area-time efficient hardware implementation of elliptic curve cryptosystem
-
A. Sghaier, M. Zeghid, B. Bouallegue, A. Baganne, and M. Machhout, "Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem". Cryptology ePrint Archive 2015.
-
(2015)
Cryptology EPrint Archive
-
-
Sghaier, A.1
Zeghid, M.2
Bouallegue, B.3
Baganne, A.4
Machhout, M.5
-
17
-
-
0003629990
-
-
PIPS Publication 180-2,August
-
PIPS Publication 180-2, "SECURE HASH STANDARD", August 2002. http://csrc.nist.gov/publications/ fips/fips180-2/fips180-2.pdf
-
(2002)
SECURE HASH STANDARD
-
-
|