[1] |
LIU Shuanggen, ZHAO Hui.
Fast and Secure Scalar Multiplication Based on Pell Sequence
[J]. Computer Engineering and Applications, 2019, 55(4): 125-129.
|
[2] |
LI Xinchao1,2, ZHONG Weidong1,2, ZHANG Shuaiwei1,2, MA Shuangpeng1,2.
New S-box of SM4 based on threshold implementation
[J]. Computer Engineering and Applications, 2018, 54(17): 83-88.
|
[3] |
LIU Shuanggen1, YAO Huatong1, LI Fagen2.
SPA resistant scalar multiplication on Edwards curve
[J]. Computer Engineering and Applications, 2017, 53(1): 103-106.
|
[4] |
LIU Shuanggen1, LI Huan1, LI Fagen2.
Error detection algorithm of resistance to fault attack on Montgomery algorithm
[J]. Computer Engineering and Applications, 2016, 52(24): 19-22.
|
[5] |
LAI Zhongxi, ZHANG Anjie, ZHANG Zhanjun.
Improved algorithms for computing 7P and 7kP on elliptic curves
[J]. Computer Engineering and Applications, 2016, 52(1): 29-32.
|
[6] |
LAI Zhongxi, LIN Junhuan, ZHANG Zhanjun.
Study on fast method of scalar multiplication on elliptic curves over Prime field [GF(P)]
[J]. Computer Engineering and Applications, 2015, 51(4): 100-104.
|
[7] |
LAI Zhongxi, ZHANG Zhanjun.
Optimizing fast field operation in elliptic curves
[J]. Computer Engineering and Applications, 2015, 51(22): 115-118.
|
[8] |
LAI Zhongxi, ZHANG Zhanjun, TAO Dongya.
Study on fast method of field operation in elliptic curves
[J]. Computer Engineering and Applications, 2014, 50(3): 67-70.
|
[9] |
WANG Chenxu1,2, ZHANG Kaifeng2, YU Mingyan1, WANG Jinxiang1.
Design and application of CPA research platform for ASIC
[J]. Computer Engineering and Applications, 2013, 49(7): 55-59.
|
[10] |
LI Haifeng1, LAN Caihui2, ZUO Weiping1, MA Haiyun1.
ID-based threshold group signature scheme without trusted party
[J]. Computer Engineering and Applications, 2012, 48(32): 89-93.
|
[11] |
WU Keshou1, CHEN Yuming1, LI Renfa2, WANG Xiaodong1.
Differential power analysis attack on IDEA
[J]. Computer Engineering and Applications, 2012, 48(29): 64-66.
|
[12] |
TONG Lian1,LIU Ning2,QIAN Jiang1.
Improved against power analysis of elliptic curve scalar multiplication algorithm
[J]. Computer Engineering and Applications, 2011, 47(33): 68-70.
|
[13] |
XU Kaiping1,ZHENG Hongyuan1,LIU Jinfeng2,GU Jingjing1.
Study on fast method of scalar multiplication in elliptic curve cryptography
[J]. Computer Engineering and Applications, 2011, 47(15): 112-115.
|
[14] |
ZHAO Geng1,2,PENG Cheng-pei1,2,LI Xiao-dong1,ZHANG Dong1,2.
Subsection simultaneous fast scalar multiplication algorithm based on Montgomery algorithm
[J]. Computer Engineering and Applications, 2010, 46(6): 112-115.
|
[15] |
ZHANG Jing-jing,LI Ren-fa,LI Lang,ZENG Qing-guang.
Research and realization of simulation of DES differential power analysis attacks
[J]. Computer Engineering and Applications, 2010, 46(33): 82-84.
|