VLSI Algorithms, Architectures, and Implementation of a Versatile GF(2m) Processor
IEEE Transactions on Computers
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Software Implementation of the NIST Elliptic Curves Over Prime Fields
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator
ISC '01 Proceedings of the 4th International Conference on Information Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Elliptic curve cryptography-based access control in sensor networks
International Journal of Security and Networks
The security of fixed versus random elliptic curves in cryptography
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Securing RDS broadcast messages for smart grid applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
Low-resource hardware design of an elliptic curve processor for contactless devices
WISA'10 Proceedings of the 11th international conference on Information security applications
Securing RDS broadcast messages for smart grid applications
International Journal of Autonomous and Adaptive Communications Systems
Secured cloud storage scheme using ECC based key management in user hierarchy
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Shifting primes on OpenRISC processors with hardware multiplier
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Hi-index | 0.01 |