Reference19 articles.
1. Washington, LC (2008) Elliptic curves: number theory and cryptography. Chapman and Hall/CRC
2. Jarvinen K, Skytta J (2008) On parallelization of high-speed processors for elliptic curve cryptography. IEEE Trans Very Large Scale Integr (VLSI) Syst 16(9):1162–1175
3. Keerthi K, Surendiran B (2017) Elliptic curve cryptography for secured text encryption. In: 2017 International conference on circuit, power and computing technologies (ICCPCT). IEEE
4. Hankerson, Darrel, Julio López Hernandez, and Alfred Menezes. “Software implementation of elliptic curve cryptography over binary fields.” International Workshop on Cryptographic Hardware and Embedded Systems.Springer, Berlin, Heidelberg, 2000
5. ANSI X9.63, Public Key Cryptography for the Financial Services Industry: Elliptic Curve Key Agreement and Key Transport Protocols, working draft, August 1999
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献