-
1Academic Journal
المؤلفون: Rolla Subrahmanyam, N. Rukma Rekha, Y. V. Subba Rao
المصدر: IEEE Access, Vol 11, Pp 45243-45254 (2023)
مصطلحات موضوعية: Secret sharing scheme (SSS), key agreement protocol (KAP), group key agreement protocol (GKAP), elliptic curve (EC), elliptic curve discrete logarithm (ECDLP), Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
2Conference
المساهمون: Xi'an Jiaotong-Liverpool University Suzhou, Swinburne University of Technology Sarawak Campus, James J. Park, Albert Zomaya, Sang-Soo Yeo, Sartaj Sahni, TC 10, WG 10.3
المصدر: Lecture Notes in Computer Science ; 9th International Conference on Network and Parallel Computing (NPC) ; https://hal.inria.fr/hal-01551382 ; 9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.492-499, ⟨10.1007/978-3-642-35606-3_58⟩
مصطلحات موضوعية: Elliptic curve (EC) cryptosystems, composite field arithmetic (CFA), Itoh and Tsujii inversion algorithm (ITIA), multiplicative inversion, [INFO]Computer Science [cs]
جغرافية الموضوع: Gwangju, South Korea
Relation: hal-01551382; https://hal.inria.fr/hal-01551382; https://hal.inria.fr/hal-01551382/document; https://hal.inria.fr/hal-01551382/file/978-3-642-35606-3_58_Chapter.pdf
-
3Academic Journal
المؤلفون: Lee, Jen-Wei, Hsiao, Ju-Hung, Chang, Hsie-Chia, Lee, Chen-Yi
المساهمون: 電子工程學系及電子研究所, Department of Electronics Engineering and Institute of Electronics
مصطلحات موضوعية: Dual fields, elliptic curve (EC) cryptography (ECC), power-analysis attacks, security system
Relation: http://hdl.handle.net/11536/16326; IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS
الاتاحة: http://hdl.handle.net/11536/16326
-
4
المؤلفون: Hitchcock, Yvonne Roslyn
مصطلحات موضوعية: Elliptic curve (EC), elliptic curve cryptosystem (ECC), discrete logarithm problem (DLP), elliptic curve discrete logarithm problem (ECDLP), speed, code size, memory usage, ram usage, fixed curve, random curve, elliptic curve digital signature algorithm (ECDSA), Pollard's rho method, Shanks's baby-step giant-step method (BSGS), Canetti-Krawczyk proof model, key exchange protocols, security proof, tripartite key exchange, pairings, password-based authentication, point addition, projective coordinates, Jacobian coordinates, Chudnovsky Jacobian coordinates, modified Jacobian coordinates, binary method, simultaneous multiple exponentiation, two-in-one scalar multiplication, coprocessor, smart card, lightweight device, simple power analysis (spa), side channel attack, equivalent security.
الاتاحة: http://eprints.qut.edu.au/15838/