Author:
Marzouqi Hamad,Al-Qutayri Mahmoud,Salah Khaled
Subject
Artificial Intelligence,Computer Networks and Communications,Hardware and Architecture,Software
Reference104 articles.
1. Use of elliptic curves in cryptography;Miller,1986
2. Elliptic curve cryptosystems;Koblitz;Math. Comput.,1987
3. A method for obtaining digital signatures and public key cryptosystems;Rivest;Commun. ACM,1978
4. Cryptography and Network Security: Principles and Practice;Stallings,2010
5. Selecting cryptographic key sizes;Lenstra;J. Cryptol.,2001
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献