[1] |
CHEN Hong, LIU Yumeng, XIAO Chenglong, GUO Pengfei, XIAO Zhenjiu.
Improved RC4 Algorithm Based on BBS Generator and Elliptic Curve
[J]. Computer Engineering and Applications, 2020, 56(8): 87-95.
|
[2] |
DENG Xiaohong, ZHU Nianhong, HUANG Lei, WANG Zhiqiang, WANG Junbin.
Research on Identity Trusteeship Model Based on Blockchain
[J]. Computer Engineering and Applications, 2020, 56(4): 24-30.
|
[3] |
LI Yanjun, WANG Shubei, YANG Xiaotong, CAO Yisen.
Lightweight NFC Security Authentication Scheme Based on Mobile Terminal
[J]. Computer Engineering and Applications, 2020, 56(16): 84-89.
|
[4] |
XIAO Shuai, WANG Xu’an, PAN Feng.
Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
[J]. Computer Engineering and Applications, 2020, 56(11): 118-123.
|
[5] |
ZHANG Ping, LI Yamin.
Forward Secure Elliptic Curve Digital Signature Scheme
[J]. Computer Engineering and Applications, 2020, 56(1): 115-120.
|
[6] |
LIU Shuanggen, ZHAO Hui.
Fast and Secure Scalar Multiplication Based on Pell Sequence
[J]. Computer Engineering and Applications, 2019, 55(4): 125-129.
|
[7] |
XU Yong1, LIU Fen2.
Research of scheme for preventing man-in-middle attack in heterogeneous sensor networks
[J]. Computer Engineering and Applications, 2018, 54(22): 99-106.
|
[8] |
ZHANG Weizhe, GAO Dezhi, LI Yan.
Hidden identity ring signature scheme using ECC
[J]. Computer Engineering and Applications, 2017, 53(23): 88-90.
|
[9] |
LIU Shuanggen1, YAO Huatong1, LI Fagen2.
SPA resistant scalar multiplication on Edwards curve
[J]. Computer Engineering and Applications, 2017, 53(1): 103-106.
|
[10] |
LI Ming.
Novel two-party authenticated key agreement protocol in Wireless Sensor Network
[J]. Computer Engineering and Applications, 2016, 52(3): 100-102.
|
[11] |
LIU Shuanggen1, LI Huan1, LI Fagen2.
Error detection algorithm of resistance to fault attack on Montgomery algorithm
[J]. Computer Engineering and Applications, 2016, 52(24): 19-22.
|
[12] |
LAI Zhongxi, ZHANG Anjie, ZHANG Zhanjun.
Improved algorithms for computing 7P and 7kP on elliptic curves
[J]. Computer Engineering and Applications, 2016, 52(1): 29-32.
|
[13] |
XIE Tianyi1, HUANG Kai1, XIU Siwen2, TANG Congxue3, YAN Xiaolang1.
VLSI implementation of elliptic curve cryptographic accelerator over [GF(p)]
[J]. Computer Engineering and Applications, 2016, 52(1): 89-94.
|
[14] |
LIAO Junguo, TAN Yongzhou.
Bilateral authentication and key agreement protocol based on lightweight CA for wireless mesh networks
[J]. Computer Engineering and Applications, 2016, 52(1): 95-99.
|
[15] |
LAI Zhongxi, LIN Junhuan, ZHANG Zhanjun.
Study on fast method of scalar multiplication on elliptic curves over Prime field [GF(P)]
[J]. Computer Engineering and Applications, 2015, 51(4): 100-104.
|