Font Size: a A A
Keyword [elliptic curves]
Result: 41 - 60 | Page: 3 of 6
41. Verifiable Secret Sharing And Proxy Signature
42. Finite Field F <sub> 2 </ Sub> On The Security Of Elliptic Curve Analysis And Its Implementation
43. The Realization Of The Elliptic Curve Cryptography And Security Analysis
44. Design And Implementation Of Secure Elliptic Curves
45. Electronic Signature Based On Elliptic Curve Systems Research And Application
46. Z <sub> 2 ~ E </ Sub> Recursive Sequences, Computing With Elliptic Curves
47. Design And Implementation, No Anonymous Two-way Authentication System Based On Elliptic Curves
48. Password Authentication, And Proxy Signature
49. Wireless Sensor Network Security Issues
50. Research And Implementation Of Proxy Multi-signature Based On Elliptic Curves Door Limit
51. Some New Optimal Pairings
52. The Research Of Elliptic Curve Point Compression Techniques And System Security Evaluation
53. Research On Communication Encryption Technique Based On DVB-RCS Satellite Communication System
54. Research On Several Problems Of Pseudorandom Sequences From Elliptic Curves
55. Fast Implementation Of Public Key Cryptographic Algorithm SM2Based On Elliptic Curves
56. Study On The Protocols Of Location-proof And Authentication Based On Bilinear Pairing
57. Research And Implementation Of A Elliptic Curve Digital Signature-Based Combination Of Public Key
58. The Research And Application Of Many-to-one Encryption Algorithm Based On Super-singular Elliptic Curves
59. The Compulation Of Characteristic Polynomials Of A Class Of Elliptic Curves
60. Research On EC-RAC Based RFID Authentication Protocols For The Application Under The Internet Of Things
  <<First  <Prev  Next>  Last>>  Jump to