-
1
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01Subjects: Get full text
Article -
2
On the Search for Supersingular Elliptic Curves and Their Applications
Published 2025-01-01Subjects: “…supersingular elliptic curves…”
Get full text
Article -
3
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01Subjects: “…Elliptic curve cryptography…”
Get full text
Article -
4
An interesting family of curves of genus 1
Published 2000-01-01Subjects: “…Elliptic curve…”
Get full text
Article -
5
An efficient method to generate elliptic curves
Published 2001-01-01Subjects: Get full text
Article -
6
A Forward-Secure Digital Signature Based on Elliptic Curve
Published 2015-10-01Subjects: Get full text
Article -
7
ECC-Based Authentication Protocol for Military Internet of Drone (IoD): A Holistic Security Framework
Published 2025-01-01Subjects: Get full text
Article -
8
Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras
Published 2025-02-01Subjects: “…Elliptic curve…”
Get full text
Article -
9
An Integrated Image Encryption Scheme Based on Elliptic Curve
Published 2023-01-01Subjects: Get full text
Article -
10
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01Subjects: Get full text
Article -
11
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Published 2016-05-01Subjects: Get full text
Article -
12
Montgomery algorithm on elliptic curves over finite fields of character three
Published 2008-01-01Subjects: “…elliptic curve…”
Get full text
Article -
13
Scheme of extending elliptic curve method to three phases
Published 2018-12-01Subjects: Get full text
Article -
14
Realization of smart home key management mechanism based on ECC
Published 2017-06-01Subjects: Get full text
Article -
15
Elliptic curve ElGamal encryption based location privacy-preserving scheme
Published 2020-06-01Subjects: Get full text
Article -
16
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01Subjects: Get full text
Article -
17
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01Subjects: Get full text
Article -
18
Cross-chain medical data sharing scheme based on elliptic curve signcryption
Published 2024-12-01Subjects: Get full text
Article -
19
Research and design of parallel architecture processor for elliptic curve cryptography
Published 2011-01-01Subjects: “…elliptic curve cryptography…”
Get full text
Article -
20
Research and simulation of timing attacks on ECC
Published 2016-04-01Subjects: Get full text
Article