Design and Implementation of Digital Signature Scheme Based on Elliptic Curve Cryptosystems
Design and Implementation of Digital Signature Scheme Based on Elliptic Curve Cryptosystems
参考文献6
-
1[1]Miller V., Uses of elliptic curves in cryptography, Advances in Cryptology, Proceedings of Crypto′85, 1985:417-426
-
2[2]Agnew G.B., Mullin R.C., An implementation of elliptic curve cryptosystems over F2155, IEEE Journal on SAC, 1993, 11(5):804-813
-
3[3]Gordon D.M., A survey of fast exponentiation methods,Journal of Algorithms, 1998, 27:129-146
-
4[4]Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation, 1987, 48:203-209
-
5[5]Han Yongfei, Efficient elliptic curve cryptosystems, The International workshop on Cryptographic Techniques & E-Commerce, Hongkong, 5-8 July 1999
-
6[6]Qiao Guopei, Finite Fields for Software Implementation of Elliptic Curve Cryptosystems
-
1吴慧,林春华.电子档案管理的网络安全设计[J].金华职业技术学院学报,2009,9(6):86-89.
-
2WEN Xiaojun,LIU Yun.Secure Authentic Digital Signature Scheme Using Quantum Fingerprinting[J].Chinese Journal of Electronics,2008,17(2):340-344. 被引量:6
-
3本月要做的5件事July[J].微型计算机,2006(20):32-32.
-
4小小.让进程管理更快捷[J].网管员世界,2011(15):120-120.
-
5邓华丽.探究混合加密算法在物联网信息安全传输系统中的应用[J].网络安全技术与应用,2016(11):63-64. 被引量:3
-
6赵明,夏宇闻,刘雷波,白国强.基于ECC芯片的数字签名系统设计[J].中国集成电路,2005,14(12):69-72.
-
7尚久庆,徐秋亮,柳欣.基于ECC的匿名签密方案[J].计算机应用,2004,24(10):59-61.
-
8Chen Yun(UEST of China, Chengdu 610054).AN IMPROVED SMM ALGORITHM[J].Journal of Electronics(China),1999,16(1):93-96. 被引量:1
-
9WCCI 2008 CALL FOR PAPERS IEEE World Congress on Computational Intelligence HongKong June 1-6, 2008[J].控制理论与应用,2007,24(3):511-511.
-
10许小龙,罗克露.椭圆曲线基点判断算法的多核并行化[J].计算机应用研究,2010,27(9):3545-3548. 被引量:1