咨询与建议

限定检索结果

文献类型

  • 24 篇 期刊文献
  • 15 篇 会议
  • 2 篇 学位论文

馆藏范围

  • 41 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 30 篇 计算机科学与技术...
    • 12 篇 电气工程
    • 11 篇 信息与通信工程
    • 7 篇 电子科学与技术(可...
    • 3 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 环境科学与工程(可...
  • 7 篇 理学
    • 4 篇 数学
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 41 篇 elliptic curve d...
  • 5 篇 blockchain
  • 4 篇 public key crypt...
  • 4 篇 ecdsa
  • 4 篇 digital signatur...
  • 3 篇 lll algorithm
  • 3 篇 elliptic curve c...
  • 3 篇 security
  • 3 篇 cloud computing
  • 2 篇 internet of thin...
  • 2 篇 elliptic curve d...
  • 2 篇 advanced encrypt...
  • 2 篇 safety applicati...
  • 2 篇 cooperative awar...
  • 2 篇 v2x communicatio...
  • 2 篇 authentication
  • 2 篇 secure hash algo...
  • 2 篇 key management
  • 2 篇 babai's nearest ...
  • 1 篇 pentanomial

机构

  • 2 篇 auckland univers...
  • 2 篇 aristotle univ t...
  • 1 篇 telecom paristec...
  • 1 篇 harbin inst tech...
  • 1 篇 ain shams univ f...
  • 1 篇 galgotias univ s...
  • 1 篇 univ jordan comp...
  • 1 篇 univ carthage in...
  • 1 篇 balqa appl univ ...
  • 1 篇 univ manitoba de...
  • 1 篇 elect & microele...
  • 1 篇 beijing inst tec...
  • 1 篇 chunghwa telecom...
  • 1 篇 southeast univ s...
  • 1 篇 misr int univ fa...
  • 1 篇 so illinois univ...
  • 1 篇 univ basrah basr...
  • 1 篇 koneru lakshmaia...
  • 1 篇 ryerson univ dep...
  • 1 篇 univ energy & na...

作者

  • 3 篇 lee chiou-yng
  • 2 篇 draziotis konsta...
  • 2 篇 adamoudis marios
  • 2 篇 poulakis dimitri...
  • 1 篇 abbdal salah h.
  • 1 篇 breveglieri luca
  • 1 篇 jin chunhua
  • 1 篇 hamadouche m'ham...
  • 1 篇 dhir renu
  • 1 篇 rui hu
  • 1 篇 zhu ting-le
  • 1 篇 akkaya kemal
  • 1 篇 rached tourki
  • 1 篇 mohsen machhout
  • 1 篇 fethi filali
  • 1 篇 poulakis d.
  • 1 篇 yassin ali a.
  • 1 篇 elemam eman
  • 1 篇 varalakshmi peru...
  • 1 篇 el-razouk hayssa...

语言

  • 41 篇 英文
检索条件"主题词=Elliptic curve digital signature algorithm"
41 条 记 录,以下是31-40 订阅
排序:
Attacking (EC)DSA scheme with ephemeral keys sharing specific bits
收藏 引用
THEORETICAL COMPUTER SCIENCE 2024年 1001卷
作者: Adamoudis, M. Draziotis, K. A. Poulakis, D. Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece Aristotle Univ Thessaloniki Dept Informat Thessaloniki 54124 Greece
In this paper, we present a deterministic attack on (EC)DSA signature scheme, providing that several signatures are known such that the corresponding ephemeral keys share a certain amount of bits without knowing their... 详细信息
来源: 评论
A simple and rapid authentication protocol in mobile networks
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2014年 第12期7卷 2596-2601页
作者: Guo, Ming-Huang Shih Hsin Univ Dept Informat Management Taipei Taiwan
Recently, mobile networks are more and more popular in providing the most pursuing pervasive networking services. Many technologies are deployed in mobile networks, such as Universal Mobile Telecommunication System (U... 详细信息
来源: 评论
Pseudo -random scalar multiplication based on group isomorphism
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020年 53卷
作者: Li, Hui Beijing Univ Chem Technol Dept Comp Sci & Technol Beijing 100029 Peoples R China
elliptic curve cryptography is an essential cryptography which is widely used in data encryption, key agreement, digital signature, and other applications. Scalar multiplication is the fundamental operation in all ECC... 详细信息
来源: 评论
Low-complexity parallel systolic Montgomery multipliers over GF(2m) using Toeplitz matrix-vector representation
收藏 引用
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 2008年 第6期E91A卷 1470-1477页
作者: Lee, Chiou-Yng Lunghwa Univ Sci & Technol Dept Comp Informat & Network Engn Tao Yuan Taiwan
In this paper, a generalized Montgomery multiplication algorithm in GF(2(m)) using the Toeplitz matrix-vector representation is presented. The hardware architectures derived from this algorithm provide low-complexity ... 详细信息
来源: 评论
Attacking (EC)DSA with partially known multiples of nonces
收藏 引用
INFORMATION AND COMPUTATION 2024年 301卷
作者: Adamoudis, Marios Draziotis, Konstantinos A. Poulakis, Dimitrios Aristotle Univ Thessaloniki Dept Math Thessaloniki 54124 Greece Aristotle Univ Thessaloniki Dept Informat GR-54124 Thessaloniki Greece
In this paper, we introduce a series of attacks on DSA schemes that, under certain assumptions, can expose the secret key when one or more signed messages are accessible. By utilizing these signed messages, we constru... 详细信息
来源: 评论
Performance comparison between IBE-HWMP and ECDSA-HWMP
收藏 引用
SECURITY AND COMMUNICATION NETWORKS 2013年 第4期6卷 437-449页
作者: Benitez, Yesica Imelda Saavedra Ben-Othman, Jalel Claude, Jean-Pierre Univ Versailles Lab CNRS Prism F-78000 Versailles France Univ Paris Nord Lab L2TI Paris France John Wiley & Sons Ltd Journals Prod Dept Chichester PO19 8SQ W Sussex England
Wireless mesh networks (WMNs) are one of the key technologies that will dominate wireless networking in the few years. The main characteristics of WMNs permit network connectivity anywhere anytime with simplicity and ... 详细信息
来源: 评论
Efficient authentication approach for highly dynamic vehicular ad hoc networks
收藏 引用
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING 2015年 第3-4期19卷 193-207页
作者: Grover, Kanika Lim, Alvin Lee, Seungbae Auburn Univ Dept Comp Sci & Software Engn Auburn AL 36849 USA
Vehicular ad hoc networks (VANETs) possess an extremely dynamic nature accompanying the high mobility feature. In VANETs, each vehicle sends out safety messages at regular intervals. IEEE 1609.2 security standard for ... 详细信息
来源: 评论
Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme
收藏 引用
INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING 2020年 第4期23卷 381-395页
作者: Ansah, Albert Kofi Kwansah Adu-Gyamfi, Daniel Univ Elect Sci & Technol China Sch Comp Sci & Engn 2006 Xiyuan Chengdu 611731 Peoples R China Univ Mines & Technol Dept Comp Sci & Engn TK 237 Tarkwa Ghana Univ Energy & Nat Resources Dept Comp Sci & Informat Sunyani Ghana
The concept of coin mixing is significant in blockchain and achieves anonymity and has merited application in bitcoin. Albeit, several coin mixing schemes have been proposed, we point out that they either hoard input ... 详细信息
来源: 评论
An identity-based authentication scheme for safety messages in WAVE-enabled VANETs
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS 2012年 第6期27卷 541-562页
作者: Biswas, Subir Misic, Jelena Misic, Vojislav Univ Manitoba Dept Comp Sci Winnipeg MB R3T 2N2 Canada Ryerson Univ Dept Comp Sci Toronto ON M5B 2K3 Canada
In a vehicular ad hoc network (VANET), a road-side infrastructure or road-side unit (RSU) is anticipated to be installed at some road-side location. This exposes the VANET to several different adversaries. In this pap... 详细信息
来源: 评论
A Novel elliptic curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System
收藏 引用
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY 2015年 第3期18卷 219-235页
作者: Mehan, Vineet Dhir, Renu Brar, Yadwinder Singh Natl Inst Technol Dept Comp Sci & Engn Jalandhar India GNDEC Ludhiana Punjab India
Cheque Truncation System (CTS) is a technique of preventing tangible movement of cheque by substituting it with a digital image, with an aim for secure and faster clearance. For the first time re-watermarking is appli... 详细信息
来源: 评论