Pages that link to "Item:Q1976039"
From MaRDI portal
The following pages link to The state of elliptic curve cryptography (Q1976039):
Displaying 31 items.
- New lattice attacks on DSA schemes (Q293717) (← links)
- A chaotic maps-based authenticated key agreement protocol with strong anonymity (Q355005) (← links)
- Some lattice attacks on DSA and ECDSA (Q429782) (← links)
- Efficient certificateless proxy signature scheme with provable security (Q454968) (← links)
- Multi-recastable e-bidding game with dual-blindness (Q462743) (← links)
- Provably secure randomized blind signature scheme based on bilinear pairing (Q604080) (← links)
- Provably convertible multi-authenticated encryption scheme for generalized group communications (Q712686) (← links)
- On the number of optimal base 2 representations of integers (Q851731) (← links)
- Guest editorial: Special issue in honor of Scott A. Vanstone (Q887413) (← links)
- The Diffie-Hellman key exchange protocol and non-Abelian nilpotent groups (Q940767) (← links)
- Self-certified multi-proxy signature schemes with message recovery (Q1045611) (← links)
- Bootstrapping for approximate homomorphic encryption (Q1648805) (← links)
- Strongly secure certificateless signature scheme supporting batch verification (Q1719253) (← links)
- A threshold signature scheme based on the elliptic curve cryptosystem (Q1765851) (← links)
- An efficient undeniable group-oriented signature scheme (Q1780481) (← links)
- A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\) (Q2089214) (← links)
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography (Q2130062) (← links)
- An application of crypto cloud computing in social networks by cooperative game theory (Q2190321) (← links)
- Convertible multi-authenticated encryption scheme (Q2465980) (← links)
- Simple authenticated key agreement and protected password change protocol (Q2485500) (← links)
- A nonlinear elliptic curve cryptosystem based on matrices (Q2490197) (← links)
- Designated verifier proxy signature scheme with message recovery (Q2571972) (← links)
- Several security schemes constructed using ECC-based self-certified public key cryptosystems (Q2572699) (← links)
- Global Duality, Signature Calculus and the Discrete Logarithm Problem (Q3091979) (← links)
- A Simple Generalization of the ElGamal Cryptosystem to Non-Abelian Groups II (Q3145453) (← links)
- An efficient ECDSA-based signature scheme for wireless networks (Q3443269) (← links)
- An efficient hierarchical key management scheme based on elliptic curves (Q4465486) (← links)
- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem (Q5034573) (← links)
- Weil polynomials of abelian varieties over finite fields with many rational points (Q5082482) (← links)
- Attacking (EC)DSA scheme with ephemeral keys sharing specific bits (Q6499547) (← links)
- Twisted Hessian curve over a local ring (Q6596793) (← links)