×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [12]
北京大学 [8]
武汉大学 [5]
软件研究所 [5]
厦门大学 [4]
兰州理工大学 [4]
更多...
内容类型
期刊论文 [34]
会议论文 [9]
其他 [6]
学位论文 [3]
发表日期
2020 [1]
2019 [2]
2018 [4]
2017 [1]
2016 [3]
2015 [4]
更多...
学科主题
Computer S... [1]
Health Car... [1]
Medical In... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共52条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
The Novel Efficient Dual-field FIPS Modular Multiplication
期刊论文
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 卷号: 14, 期号: 2, 页码: 738-756
作者:
Zhang, Tingting
;
Zhu, Junru
;
Liu, Yang
;
Chen, Fulong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2020/12/10
Montgomery algorithm
FIPS
Modular Multiplication
Modular Square
Dual-field
Anonymous biometrics-based authentication with key agreement scheme for multi-server environment using ECC
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 19
作者:
Qi, Mingping
;
Chen, Jianhua
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/05
Elliptic curve cryptography
Multi-server
Biometrics
Authentication
Three-factor
Smart-card
A secure authentication with key agreement scheme using ECC for satellite communication systems
期刊论文
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 2019, 卷号: 37, 期号: 3
作者:
Qi, Mingping
;
Chen, Jianhua
;
Chen, Yitao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
authentication
elliptic curve cryptography
satellite communication
smart card
A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
期刊论文
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 卷号: 164
作者:
Qi, Mingping
;
Chen, Jianhua
;
Chen, Yitao
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/05
Biometrics
Authentication
TMIS
Multi-server
Smart card
Elliptic curve cryptography
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks
期刊论文
INFORMATION SCIENCES, 2018, 卷号: Vol.451, 页码: 1-15
作者:
Cui, J
;
Zhang, J
;
Zhong, H
;
Shi, RH
;
Xu, Y
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/26
Vehicular
ad
hoc
networks
(VANETs)
Certificateless
public
key
cryptography
Aggregate
signature
Elliptic
curve
cryptosystem
(ECC)
Privacy
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF(p)
会议论文
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018-01-01
作者:
Liu, JianWei
;
Cheng, DongXu
;
Guan, ZhenYu
;
Wang, Ziyu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Elliptic curve cryptography
Montgomery multiplication
Parallel scheduling architecture
Scalar point multiplier
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Liu, J.
;
Guan, Z.
;
Cheng, D.
;
Wang, Z.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Computation theory
Distributed computer systems
Geometry
Integer programming
Integrated circuit design
Multipurpose robots
Public key cryptography
Robotics
VLSI circuits
Elliptic curve cryptography
Elliptic Curve Cryptography (ECC)
Modular inversion algorithms
Modular Multiplication
Montgomery multiplication
Parallel scheduling
Point multipliers
Scalar point multiplication
Speed
High-Performance Noninvasive Side-Channel Attack Resistant ECC Coprocessor for GF(2(m))
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017
Liao, Kai
;
Cui, Xiaoxin
;
Liao, Nan
;
Wang, Tian
;
Yu, Dunshan
;
Cui, Xiaole
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Binary finite field arithmetic
elliptic curve cryptography (ECC)
hybrid operation sequence
noninvasive side-channel attack (SCA)
randomized Montgomery operation
DIVISION
一种新的余数系统下快速计算素域椭圆曲线点乘的方法
期刊论文
2016, 2016
吴焘
;
李树国
;
刘理天
;
WU Tao
;
LI Shu-guo
;
LIU Li-tian
收藏
  |  
浏览/下载:3/0
Implementation of a Resource-Constrained ECC Processor with Power Analysis Countermeasure
会议论文
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Jeju, SOUTH KOREA, OCT 25-28, 2016
作者:
Liu, Zilong
;
Liu, Dongsheng
;
Sun, Xiangcheng
;
Zou, Xuecheng
;
Lin, Hui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/04
Elliptic Curve Cryptography
power analysis countermeasure
RFID
©版权所有 ©2017 CSpace - Powered by
CSpace