Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. [PDF]
Zhao X, Li D, Li H.
europepmc +1 more source
On the rank of the elliptic curve $y^2 = x^3 + k$ [PDF]
Shoichi Kihara
openalex +1 more source
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography. [PDF]
Chen Y, Chen J.
europepmc +1 more source
Arithmetic of Elliptic Curves Upon Quadratic Extension [PDF]
Kenneth Kramer
openalex +1 more source
On sums of squares and on elliptic curves over function fields
J. W. S. Cassels +2 more
openalex +1 more source
Elliptic curves with good reduction everywhere over quadratic fields and having rational $j$-invariant [PDF]
Bennett Setzer
openalex +1 more source
Mitigate Wormhole Attack and Blackhole Attack Using Elliptic Curve Cryptography in MANET. [PDF]
Shukla M, Joshi BK, Singh U.
europepmc +1 more source
In-Plane Vibrations of Elliptic Arc Bar and Sine Curve Bar
Shin TAKAHASHI +3 more
openalex +2 more sources
Cusp forms of weight one, quartic reciprocity and elliptic curves [PDF]
Noburo Ishii
openalex +1 more source
LC-DEX: Lightweight and Efficient Compressed Authentication Based Elliptic Curve Cryptography in Multi-Hop 6LoWPAN Wireless Sensor Networks in HIP-Based Internet of Things. [PDF]
Bettoumi B, Bouallegue R.
europepmc +1 more source

