|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 19 occurrences of 16 keywords
|
|
|
Results
Found 44 publication records. Showing 44 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
109 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers, pp. 129-143, 2002, Springer, 3-540-00409-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
address-bit DPA, scalar exponentiation, OK-ECDH, OK-ECDSA, Differential power analysis (DPA), elliptic curve cryptosystems (ECC) |
95 | Christian Lederer, Roland Mader, Manuel Koschuch, Johann Großschädl, Alexander Szekely, Stefan Tillich |
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pp. 112-127, 2009, Springer, 978-3-642-03943-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Zeyu Yang, Ziqing Wang, Fei Qiu, Fagen Li |
A group key agreement protocol based on ECDH and short signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 72, pp. 103388, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi |
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 76, pp. 103523, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Haitham Y. Adarbah, Mostafa Farhadi Moghadam, Rolou Lyn Rodriguez Maata, Amir Hossein Mohajerzadeh, Ali H. Al-Badi |
Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 11268-11280, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | K. C. Prabu Shankar, S. Prayla Shyry |
A Novel Framework for Securing ECDH Encrypted DICOM Pixel Data Stored Over Cloud Using IPFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. ![In: Int. J. Uncertain. Fuzziness Knowl. Based Syst. 31(Supplement-1), pp. 135-164, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Eman Talib Alghareeb, Valeriy O. Osipyan |
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 47(5), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | V. Padmanabha Reddy, R. Murali Prasad, Pamula Udayaraju, Bhattu HariPrasad Naik, Ch. Raja |
Efficient medical image security and transmission using modified LZW compression and ECDH-AES for telemedicine applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 27(13), pp. 9151-9168, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Zhengjun Cao |
A note on "HAKECC: highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1771, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
28 | Nguyen Van Nghi, Do Quang Trung, Dinh Tien Thanh |
Two Novel Variants of ECDH Key Exchange Protocol Using Schnorr Zero-Knowledge Proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSE ![In: 15th International Conference on Knowledge and Systems Engineering, KSE 2023, Hanoi, Vietnam, October 18-20, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-2974-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Umesh K. Raut, L. K. Vishwamitra |
Multi-Level ECDH-Based Authentication Protocol for Secure Software-Defined VANET Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Mob. Comput. Multim. Commun. ![In: Int. J. Mob. Comput. Multim. Commun. 13(1), pp. 1-28, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1239, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
28 | Prihatin Oktivasari, Maria Agustin, Rahmat Esa Mohammad Akbar, Asep Kurniawan, Ayu Rosyida Zain, Fachroni Arbi Murad |
Analysis of ECG Image File Encryption using ECDH and AES-GCM Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWBIS ![In: 7th International Workshop on Big Data and Information Security, IWBIS 2022, Depok, Indonesia, October 1-3, 2022, pp. 75-80, 2022, IEEE, 978-1-6654-8950-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jun Xu 0022, Santanu Sarkar 0001, Huaxiong Wang, Lei Hu |
Improving Bounds on Elliptic Curve Hidden Number Problem for ECDH Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III, pp. 771-799, 2022, Springer, 978-3-031-22968-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tianhong Xu, Cheng Gongye, Yunsi Fei |
Protected ECC Still Leaks: A Novel Differential-Bit Side-channel Power Attack on ECDH and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6 - 8, 2022, pp. 9-14, 2022, ACM, 978-1-4503-9322-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tinku Adhikari, Malay Kule, Ajoy Kumar Khan |
An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCNT ![In: 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, Kharagpur, India, October 3-5, 2022, pp. 1-5, 2022, IEEE, 978-1-6654-5262-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Sina Baghbanijam, Hanie Sanaei |
An Improved Authentication & Key Exchange Protocol Based on ECDH for WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.11450, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
28 | Reza Azarderakhsh, Rami Elkhatib, Brian Koziel, Brandon Langenberg |
Hardware Deployment of Hybrid PQC: SIKE+ECDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm (2) ![In: Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II, pp. 475-491, 2021, Springer, 978-3-030-90021-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Mostafa Farhadi Moghadam, Mahdi Nikooghadam, Maytham Azhar Baqer Al Jabban, Mohammad Alishahi, Leili Mortazavi, Amir Hossein Mohajerzadeh |
An Efficient Authentication and Key Agreement Scheme Based on ECDH for Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 73182-73192, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Sameer Farooq, Priyanka Chawla |
A novel approach of asymmetric key generation in symmetric AES via ECDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Assur. Eng. Manag. ![In: Int. J. Syst. Assur. Eng. Manag. 11(5), pp. 962-971, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Yi Jiang, Yong Shen, Qingyi Zhu |
A Lightweight Key Agreement Protocol Based on Chinese Remainder Theorem and ECDH for Smart Homes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(5), pp. 1357, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
SeCon-NG: implementing a lightweight cryptographic library based on ECDH and ECDSA for the development of secure and privacy-preserving protocols in contiki-NG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020, pp. 767-769, 2020, ACM, 978-1-4503-6866-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Eugene Frimpong, Antonis Michalas |
IoT-CryptoDiet: Implementing a Lightweight Cryptographic Library based on ECDH and ECDSA for the Development of Secure and Privacy-preserving Protocols in Contiki-NG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IoTBDS ![In: Proceedings of the 5th International Conference on Internet of Things, Big Data and Security, IoTBDS 2020, Prague, Czech Republic, May 7-9, 2020., pp. 101-111, 2020, SCITEPRESS, 978-989-758-426-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Johann Großschädl, Zhe Liu 0001, Zhi Hu, Chunhua Su, Lu Zhou 0002 |
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIoT ![In: 2019 International Workshop on Secure Internet of Things, SIoT 2019, Luxembourg, Luxembourg, September 26, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-4135-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Christian Franck, Johann Großschädl, Yann Le Corre, Cyrille Lenou Tago |
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FiCloud Workshops ![In: 6th International Conference on Future Internet of Things and Cloud Workshops, FiCloud Workshops 2018, Barcelona, Spain, August 6-8, 2018, pp. 231-236, 2018, IEEE Computer Society, 978-1-5386-7810-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ilari Liusvaara |
CFRG Elliptic Curve Diffie-Hellman (ECDH) and Signatures in JSON Object Signing and Encryption (JOSE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8037, pp. 1-14, January 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Vankamamidi Srinivasa Naresh, Nistala V. E. S. Murthy |
Provably secure group key agreement protocol based on ECDH with integrated signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(10), pp. 1085-1102, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 129, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
28 | Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer |
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings, pp. 219-235, 2016, Springer, 978-3-319-29484-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Zhe Liu 0001, Hwajeong Seo, Zhi Hu, Xinyi Huang 0001, Johann Großschädl |
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pp. 145-153, 2015, ACM, 978-1-4503-3245-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jinhee Seo, Jihong Park, Young Jun Kim, DongYeop Hwang, Kangseok Kim, Ki-Hyung Kim, Ki-Beon Lee |
An ECDH-based light-weight mutual authentication scheme on local SIP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUFN ![In: Seventh International Conference on Ubiquitous and Future Networks, ICUFN 2015, Sapporo, Japan, July 7-10, 2015, pp. 871-873, 2015, IEEE, 978-1-4799-8993-5. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Tibor Jager, Jörg Schwenk, Juraj Somorovsky |
Practical Invalid Curve Attacks on TLS-ECDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (1) ![In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I, pp. 407-425, 2015, Springer, 978-3-319-24173-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Qiuna Niu |
ECDH-based Scalable Distributed Key Management Scheme for Secure Group Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 9(1), pp. 153-160, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
28 | S. Pradheepkumar, V. Vijayalakshmi 0001, G. Zayaraz 0001 |
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 2(1), 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
28 | Ramalingam Shankar, Timothy Rajkumar, Perumal Dananjayan |
Security enhancement with optimal QoS using ECDH for converged 3G-WLAN system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 11th International Conference on Control, Automation, Robotics and Vision, ICARCV 2010, Singapore, 7-10 December 2010, Proceedings, pp. 1709-1713, 2010, IEEE, 978-1-4244-7814-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Hua-Yi Lin, Tzu-Chiang Chiang |
Wireless Bluetooth Communications Combine with Secure Data Transmission Using ECDH and Conference Key Agreements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (1) ![In: Algorithms and Architectures for Parallel Processing, 10th International Conference, ICA3PP 2010, Busan, Korea, May 21-23, 2010. Proceedings. Part I, pp. 538-548, 2010, Springer, 978-3-642-13118-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Hua-Yi Lin, Tzu-Chiang Chiang |
Cooperative Secure Data Aggregation in Sensor Networks Using Elliptic Curve Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDVE ![In: Cooperative Design, Visualization, and Engineering, 6th International Conference, CDVE 2009, Luxembourg, Luxembourg, September 20-23, 2009. Proceedings, pp. 384-387, 2009, Springer, 978-3-642-04264-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cooperative WSNs, DH, RSA, DLP |
23 | Neil Costigan, Peter Schwabe |
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 368-385, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation |
23 | Huawei Huang, Bo Yang 0003, Shenglin Zhu, Guozhen Xiao |
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 1-21, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
matrix semigroup action, DDH problem, public key cryptosystem, semantically secure |
23 | Chae Hoon Lim |
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 376-381, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Adam L. Young, Moti Yung |
A Timing-Resistant Elliptic Curve Backdoor in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 427-441, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Twisted elliptic curves, RSA, subliminal channel, kleptography |
23 | Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 291-301, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Bok-Nyong Park, Jae-Won Kim, Wonjun Lee 0001 |
PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 574-579, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
License Management Protocol, Privacy, Anonymity, Public-Key Cryptosystem, DRM |
23 | Olivier Billet, Marc Joye |
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 15th International Symposium, AAECC-15, Toulouse, France, May 12-16, 2003, Proceedings, pp. 34-42, 2003, Springer, 3-540-40111-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis |
Displaying result #1 - #44 of 44 (100 per page; Change: )
|
|