[1] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[2] |
LAI Zhongxi, ZHANG Anjie, ZHANG Zhanjun.
Improved algorithms for computing 7P and 7kP on elliptic curves
[J]. Computer Engineering and Applications, 2016, 52(1): 29-32.
|
[3] |
RAN Pei, YANG Jiyun, TAN Jinyong.
New protection scheme for integrity of Word electronic document
[J]. Computer Engineering and Applications, 2013, 49(13): 76-79.
|
[4] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[5] |
MI Junli1,LI Subei1,ZHANG Jianzhong2.
ID-based proxy signature scheme without trusted center
[J]. Computer Engineering and Applications, 2011, 47(26): 83-85.
|
[6] |
XU Kaiping1,ZHENG Hongyuan1,LIU Jinfeng2,GU Jingjing1.
Study on fast method of scalar multiplication in elliptic curve cryptography
[J]. Computer Engineering and Applications, 2011, 47(15): 112-115.
|
[7] |
TONG Lian,QIAN Jiang .
Scalar multiplication algorithm against SPA and DPA attacks in ECC
[J]. Computer Engineering and Applications, 2010, 46(35): 72-74.
|
[8] |
LU Jie-ru,SU Bing.
Design of supporting ECC digital certificate in IKEv2 authentication
[J]. Computer Engineering and Applications, 2009, 45(2): 106-108.
|
[9] |
ZHANG Jun-hong1,2,CHEN Xin-meng1.
Kind of key agreement in electronic commerce
[J]. Computer Engineering and Applications, 2008, 44(7): 139-140.
|
[10] |
FU Mao-sheng1,2,LUO Bin1.
(t,n) threshold secret sharing scheme without SDC based on ECC
[J]. Computer Engineering and Applications, 2008, 44(32): 85-86.
|
[11] |
YANG Min1,MENG Qing-shu2,ZHANG Huan-guo2.
Construction of error-correction cryptosystem based on ECC and HFE
[J]. Computer Engineering and Applications, 2008, 44(27): 31-32.
|
[12] |
QIN Fan,DAI Zi-bin .
Design and implementation of modular inversion for elliptic curve over finite prime field
[J]. Computer Engineering and Applications, 2008, 44(23): 117-119.
|
[13] |
LIU Wen-bo,ZHANG Fan,GUO Yun-fei,LIU Li-xiong.
Research on optimal techniques for software implementation of ECC over F2m field
[J]. Computer Engineering and Applications, 2008, 44(19): 28-30.
|
[14] |
WANG Xu,QIAN Xue-zhong.
Certificateless signature scheme provably secure in standard model
[J]. Computer Engineering and Applications, 2008, 44(11): 129-132.
|
[15] |
.
(t, n) Threshold Key Escrow Scheme Based on Status-tree
[J]. Computer Engineering and Applications, 2007, 43(4期): 146-149.
|