CORC

浏览/检索结果: 共16条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
On emerging family of elliptic curves to secure internet of things: ECC comes of age 期刊论文
IEEE Transactions on Dependable and Secure Computing, 2017, 卷号: 14, 期号: 3, 页码: 237-248
作者:  Liu, Zhe*;  Huang, Xinyi;  Hu, Zhi;  Khan, Muhammad Khurram;  Seo, Hwajeong
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/03
Simple Method for Realizing Weil Theorem in Secure ECC Generation 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 卷号: 22, 页码: 511-519
作者:  Hu, Feng[1];  Wang, Chao[2];  Zhang, Huanguo[3];  Wu, Jie[4]
收藏  |  浏览/下载:4/0  |  提交时间:2019/04/24
Simple Method for Realizing Weil Theorem in Secure ECC Generation 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 卷号: 22, 期号: 5
作者:  Hu, Feng;  Wang, Chao;  Zhang, Huanguo;  Wu, Jie
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings 其他
2013-01-01
Qi Yanfeng; Tang Chunming; Lou Yu; Xu Maozhi; Guo Baoan
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/13
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems 期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2012
作者:  Keke Wu;  Huiyun Li;  Dingju Zhu
收藏  |  浏览/下载:8/0  |  提交时间:2015/08/25
Isomorphism classes of Jacobi quartic curve over finite fields 其他
2012-01-01
Wu, Hongfeng; Feng, Rongquan
收藏  |  浏览/下载:2/0  |  提交时间:2015/11/17
a new efficient property-based attestation protocol based on elliptic curves 会议论文
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012, Liverpool, United kingdom, June 25, 2012 - June 27, 2012
Chu Xiaobo; Yu Qin
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
an efficient pba protocol based on elliptic curves 会议论文
2011 IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, 27-May-20
Chu Xiaobo; Qin Yu; Feng Dengguo
收藏  |  浏览/下载:10/0  |  提交时间:2011/10/10
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST 期刊论文
CHINA COMMUNICATIONS, 2011, 卷号: 8, 页码: 41-49
作者:  Wang Chao[1];  Zhang Huanguo[2];  Liu Lili[3]
收藏  |  浏览/下载:3/0  |  提交时间:2019/04/30
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST 期刊论文
CHINA COMMUNICATIONS, 2011, 卷号: 8, 期号: 4
作者:  Wang Chao;  Zhang Huanguo;  Liu Lili
收藏  |  浏览/下载:2/0  |  提交时间:2019/12/05


©版权所有 ©2017 CSpace - Powered by CSpace