×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [20]
清华大学 [12]
深圳先进技术研究院 [9]
软件研究所 [9]
山东大学 [6]
北京航空航天大学 [5]
更多...
内容类型
期刊论文 [41]
会议论文 [23]
其他 [15]
学位论文 [3]
会议 [1]
发表日期
2019 [1]
2018 [2]
2017 [2]
2016 [1]
2015 [5]
2014 [4]
更多...
学科主题
Engineerin... [2]
Computer S... [1]
Telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共83条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Montgomery Algorithm over a Prime Field
期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2019, 卷号: Vol.28 No.1, 页码: 39-44
作者:
Yu Wei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/17
Elliptic curve
Montgomery algorithm
Scalar multiplication
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF(p)
会议论文
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018-01-01
作者:
Liu, JianWei
;
Cheng, DongXu
;
Guan, ZhenYu
;
Wang, Ziyu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Elliptic curve cryptography
Montgomery multiplication
Parallel scheduling architecture
Scalar point multiplier
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Liu, J.
;
Guan, Z.
;
Cheng, D.
;
Wang, Z.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Computation theory
Distributed computer systems
Geometry
Integer programming
Integrated circuit design
Multipurpose robots
Public key cryptography
Robotics
VLSI circuits
Elliptic curve cryptography
Elliptic Curve Cryptography (ECC)
Modular inversion algorithms
Modular Multiplication
Montgomery multiplication
Parallel scheduling
Point multipliers
Scalar point multiplication
Speed
High-Performance Noninvasive Side-Channel Attack Resistant ECC Coprocessor for GF(2(m))
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017
Liao, Kai
;
Cui, Xiaoxin
;
Liao, Nan
;
Wang, Tian
;
Yu, Dunshan
;
Cui, Xiaole
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2017/12/03
Binary finite field arithmetic
elliptic curve cryptography (ECC)
hybrid operation sequence
noninvasive side-channel attack (SCA)
randomized Montgomery operation
DIVISION
Low-computation certificateless hybrid signcryption scheme
期刊论文
2017, 卷号: 18, 期号: 7, 页码: 928
作者:
Hui-fang YU[1]
;
Bo YANG[2,3]
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Hybrid signcryption
Scalar multiplication
Certificateless cryptosystem
Provable security
Some techniques for faster scalar multiplication on GLS curves
其他
2016-01-01
Hu, Zhi
;
Zhang, Guoliang
;
Xu, Maozhi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/12/03
Cryptography
Elliptic curve
Hyperelliptic curve
Scalar multiplication algorithm
GLV method
TWISTED EDWARDS CURVES
HYPERELLIPTIC CURVES
ENDOMORPHISMS
Uniqueness of Rankin-Selberg Periods
期刊论文
INTERNATIONAL MATHEMATICS RESEARCH NOTICES, 2015, 期号: 14, 页码: 5849-5873
作者:
Chen, Fulin
;
Sun, Binyong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2018/07/30
Protecting Elliptic Curve Cryptography Against Memory Disclosure Attacks
其他
2015-01-01
Yang, Yang
;
Guan, Zhi
;
Liu, Zhe
;
Chen, Zhong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
Elliptic curve cryptography
Efficient implementation
Memory disclosure attack
Cold boot attack
AVX
CLMUL
BITS
A countermeasure for power analysis to scalar multiplication of ECC hardware
其他
2015-01-01
Liu, Lifei
;
Cui, Xiaole
;
Ran, Yalin
;
Cui, Xiaoxin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
A Countermeasure for Power Analysis to Scalar Multiplication of ECC Hardware
其他
2015-01-01
Liu, Lifei
;
Cui, Xiaole
;
Ran, Yalin
;
Cui, Xiaoxin
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2017/12/03
©版权所有 ©2017 CSpace - Powered by
CSpace