Suggested Topics within your search.
Suggested Topics within your search.
Authentication
2
Public key cryptography
2
elliptic curve cryptography (ECC)
2
Attribute-based
1
Attribute-based signatures
1
B-curves
1
Blind signatures
1
Computational efficiency
1
Computer Security
1
Confidentiality
1
Cryptography
1
Efficiency
1
Elliptic Curve Cryptography(ECC)
1
Elliptic curve cryptography
1
Elliptic curve discrete logarithm problem
1
Elliptic curve discrete logarithm problems
1
Entropy
1
Geometry
1
Humans
1
Key policies
1
Key policy attribute-based signature
1
LSSS matrix
1
Linear secret sharing scheme matrix
1
Linear secret sharing schemes
1
Man in the middle attacks
1
Mathematical algorithms
1
Matrix algebra
1
Montgomery kP
1
P-curves
1
PKI
1
-
1
-
2
-
3
-
4by Hamed Bashirpour, Saman Bashirpour, Shahaboddin Shamshirband, Anthony T. ChronopoulosSubjects: “...elliptic curve cryptography (ECC)...”
Published 2018-03-01
Get full text
Article -
5
-
6
-
7
-
8
-
9
-
10by Abdul Waheed, Arif Iqbal Umar, Mahdi Zareei, Nizamud Din, Noor Ul Amin, Jawaid Iqbal, Yousaf Saeed, Ehab Mahmoud MohamedSubjects: “...elliptic curve cryptography (ECC)...”
Published 2020-01-01
Get full text
Article -
11by Χριστόπουλος, Ρένος-ΝεκτάριοςSubjects: “...Elliptic curve cryptography (ECC)...”
Published 2013
Get full text
-
12Subjects: “...video encryption, Mobile Application, encryption, decryption, confidentiality, elliptic curve...”
Get full text
Article -
13by Guosheng Xu, Shuming Qiu, Haseeb Ahmad, Guoai Xu, Yanhui Guo, Miao Zhang, Hong XuSubjects: “...elliptic curve cryptography (ECC)...”
Published 2018-07-01
Get full text
Article -
14
-
15
-
16
-
17
-
18
-
19
-
20by Md. Mainul Islam, Md. Selim Hossain, Moh. Khalid Hasan, Md. Shahjalal, Yeong Min JangSubjects: “...elliptic curve cryptography (ECC)...”
Published 2020-09-01
Get full text
Article