1
Published 2016
Table of Contents: '; ...Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve...
Get full text
2
Published 2014
Table of Contents: '; ...Payment Systems -- Case Studies -- Cloud and Virtualization -- Elliptic Curve Cryptography...
Get full text
3
Published 2017
Table of Contents: '; ... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....
Get full text
4
Published 2017
Table of Contents: '; ... security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography....
Get full text
5
Published 2015
Table of Contents: '; ...System Security -- Stream Cipher -- Analysis -- Key Exchange Protocol -- Elliptic Curve...
Get full text
6
Published 2013
Table of Contents: '; ... implementations and fault attacks -- Efficient and secure implementations -- Elliptic curve cryptography...
Get full text
7
by Biggs, Norman L., Biggs, Norman L.
Published 2008
Table of Contents: '; ... -- The RSA cryptosystem -- Cryptography and calculation -- Elliptic curve cryptography....
Get full text
8
by Yan, Song Y., Yan, Song Y.
Published 2019
Table of Contents: '; ... -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography....
Get full text
9
Table of Contents: '; ... Designs For the Advanced Encryption Standard -- Elliptic Curve Cryptography....
Get full text
10
by Buell, Duncan., Buell, Duncan.
Published 2021
Table of Contents: '; ... Effectively -- 13. Cycles, Randomness, Discrete Logarithms, and Key Exchange -- 14. Elliptic Curve...
Get full text
11
Published 2017
Table of Contents: '; ... and Tools for Simulation -- Recent developments in side-channel analysis on Elliptic Curve Cryptography...
Get full text
12
Table of Contents: '; ... -- Chap. 11 Elliptic Curve Cryptography -- App. A Some Maple Conversion Functions -- Acronyms...
Get full text
13
Published 2013
Table of Contents: '; ... Instruction-Set Processor for Elliptic Curve Cryptography -- ITUbee: A Software Oriented Lightweight Block...
Get full text
14
15
Published 2019
Table of Contents: '; ... -- Implementation of a secure Cloud computing authentication using Elliptic curve Cryptography -- Log-based Approach...
Get full text
16
Published 2014
Table of Contents: '; ... Security Algorithm for Mutual Node Authentication and Key Management: An Elliptic Curve Cryptography Based...
Get full text
17
Published 2018
Table of Contents: '; .... Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography...
Get full text
18
19
20
Published 2013
Table of Contents: '; ... with Specific Focus on IPv6 -- Fast Scalar Multiplication on Elliptic Curve Cryptography in Selected Intervals...
Get full text