-
21
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: Get full text
Article -
22
Security authentication protocol based on elliptic curve cryptography and cookie information for terminal of IoT
Published 2016-06-01Subjects: Get full text
Article -
23
Chosen message attacks method against ECC implementations
Published 2014-05-01Subjects: “…Elliptic curve cryptosystem…”
Get full text
Article -
24
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01Subjects: “…elliptic curve…”
Get full text
Article -
25
Efficient pairing-free CP-ABE based on ordered binary decision diagram
Published 2019-12-01Subjects: Get full text
Article -
26
Forgery attacks on several certificateless signature schemes
Published 2020-06-01Subjects: Get full text
Article -
27
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: Get full text
Article -
28
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article -
29
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: “…elliptic curve…”
Get full text
Article -
30
Pseudo 4D projective coordinate-based multi-base scalar multiplication
Published 2018-05-01Subjects: “…elliptic curve cryptosystem…”
Get full text
Article -
31
New group key management framework for mobile ad hoc network based on identity authentication in elliptic curve field
Published 2007-01-01Subjects: Get full text
Article -
32
Electronic cash system based on certificateless group signature
Published 2016-05-01Subjects: “…elliptic curve…”
Get full text
Article -
33
Leakage-resilient certificateless signcryption scheme
Published 2017-11-01Subjects: Get full text
Article -
34
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: Get full text
Article -
35
-
36
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01Subjects: Get full text
Article -
37
Fault analysis on elliptic curve cryptosystems with sliding window method
Published 2012-01-01Subjects: Get full text
Article -
38
Efficient certificateless multi-receiver anonymous signcryption scheme
Published 2016-06-01Subjects: Get full text
Article -
39
A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services
Published 2024-12-01Subjects: “…functional biased elliptic curve cryptography algorithm (fb-ecc)…”
Get full text
Article