Results 131 to 140 of about 2,272,026 (278)

The rank of elliptic curves

open access: yesDuke Mathematical Journal, 1977
Brumer, Armand, Kramer, Kenneth
openaire   +4 more sources

RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

open access: yesDianxin kexue, 2016
For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on ...
Wumei ZHANG
doaj  

Counting points on elliptic curves over $\bold F\sb {2\sp m}$ [PDF]

open access: bronze, 1993
Alfred Menezes   +2 more
openalex   +1 more source

Privacy-preserving communication in smart city transportation using elliptic curve cryptography. [PDF]

open access: yesSci Rep
Mohammed ZK   +7 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy