Author:
Javeed Khalid,Wang Xiaojun,Scott Mike
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference36 articles.
1. Elliptic curve cryptosystems;Koblitz;Math. Comput.,1987
2. Use of elliptic curves in cryptography;Miller,1986
3. A method for obtaining digital signatures and public-key cryptosystems;Rivest;Commun. ACM,1978
4. Timing attacks on implementations of Diffie–Hellman, rsa, dss, and other systems;Kocher,1996
5. Introduction to side-channel attacks;Standaert,2010
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献