Suggested Topics within your search.
Computer security 14 Systems and Data Security 14 Cryptology 13 Data encryption (Computer science) 13 Computer Communication Networks 8 Computer communication systems 8 Algorithm Analysis and Problem Complexity 7 more ...
Computer security 14 Systems and Data Security 14 Cryptology 13 Data encryption (Computer science) 13 Computer Communication Networks 8 Computer communication systems 8 Algorithm Analysis and Problem Complexity 7 more ...
1
Published 2016
Table of Contents: ';
“...Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve...”Get full text
2
Published 2014
Table of Contents: ';
“...Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography...”Get full text
3
Published 2017
Table of Contents: ';
“... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....”Get full text
4
Published 2017
Table of Contents: ';
“... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....”Get full text
5
Published 2015
Table of Contents: ';
“...System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve...”Get full text
6
Published 2013
Table of Contents: ';
“... implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography...”Get full text
7
Table of Contents: ';
“... -- The RSA cryptosystem -- Cryptography and calculation -- Elliptic curve cryptography....”
Get full text
Get full text
8
Table of Contents: ';
“... -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography....”
Get full text
Get full text
9
by Rodriguez-Henriquez, Francisco., Rodriguez-Henriquez, Francisco., Saqib, N.A., Díaz Pérez, Arturo., Koc, Cetin Kaya.
Published 2007
Table of Contents: ';
“... Designs For the Advanced Encryption Standard -- Elliptic Curve Cryptography....”Published 2007
Get full text
10
Fundamentals of Cryptography Introducing Mathematical and Algorithmic Foundations / by Duncan Buell.
Table of Contents: ';
“... Effectively -- 13. Cycles, Randomness, Discrete Logarithms, and Key Exchange -- 14. Elliptic Curve...”Get full text
11
Published 2017
Table of Contents: ';
“... and Tools for Simulation -- Recent developments in side-channel analysis on Elliptic Curve Cryptography...”Get full text
12
Table of Contents: ';
“... -- Chap. 11 Elliptic Curve Cryptography -- App. A Some Maple Conversion Functions -- Acronyms...”
Get full text
Get full text
13
Published 2013
Table of Contents: ';
“... Instruction-Set Processor for Elliptic Curve Cryptography -- ITUbee: A Software Oriented Lightweight Block...”Get full text
14
15
Published 2019
Table of Contents: ';
“... -- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography -- Log-based Approach...”Get full text
16
Published 2014
Table of Contents: ';
“... Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based...”Get full text
17
Published 2018
Table of Contents: ';
“.... Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography...”Get full text
18
by Vollala, Satyanarayana., Vollala, Satyanarayana., Ramasubramanian, N., Tiwari, Utkarsh.
Published 2021
Get full textPublished 2021
19
20
Published 2013
Table of Contents: ';
“... with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals...”Get full text