Author:
Nikooghadam Morteza,Zakerolhosseini Ali
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Modelling and Simulation,Information Systems,Signal Processing,Theoretical Computer Science,Control and Systems Engineering
Reference35 articles.
1. Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.
2. Miller, V.S. (1986). Uses of elliptic curves in cryptography. In H. C. Williams, (Ed.), Advances in Cryptology – CRYPTO ’85, volume 218 of LNCS, (pp 417–428). Springer.
3. Kim, H. S., & Lee, S. W. (2007). LFSR multipliers over GF(2 m) defined by all-one polynomial. Integration, the VLSI Journal, 40(4), 473–478.
4. Nikooghadam, M., Zakerolhosseini, A., & Ebrahimi Moghaddam, M. (2010). Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Journal of System and Software, 83(10), 1917–1929.
5. Nikooghadam, M., & Zakerolhosseini, A. (2009). An efficient blind signature scheme based on the elliptic curve discrete logarithm problem. The ISC Int’l Journal of Information Security, 1(2), 125–131.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献