Elliptic curve cryptography
Elliptic Curve Cryptography Based Algorithm for Privacy Preserving in Data Mining
8
Implementation of message authentication scheme with elliptic curve cryptography
6
Outline of Modified Menezes Vanstone Elliptic Curve Cryptography Algorithm
5
Upgrade of GSM Security Using Elliptic Curve Cryptography Algorithm
5
A Survey on Various Algorithms Used for Elliptic Curve Cryptography
6
A Review on Distributed System Security using Elliptic Curve Cryptography
6
Guide to Elliptic Curve Cryptography pdf
332
Software Implementations of Elliptic Curve Cryptography
27
Efficient Arithmetic for the Implementation of Elliptic Curve Cryptography
153
Data Security in Cloud Computing with Elliptic Curve Cryptography
14
An Analysis of Cryptosystems Using Elliptic Curve Cryptography
6
Elliptic Curve Cryptography for Securing Cloud Computing Applications
8
Secured Data Transmission Using Elliptic Curve Cryptography
7
Fast Software Implementation of Binary Elliptic Curve Cryptography
19
Extension of Kerberos with X 509 and Integration of Elliptic Curve Cryptography in Authentication
10
Prospective Utilization of Elliptic Curve Cryptography for Security Enhancement
6
On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography
20
Proposed secureSIP Authentication Scheme based on Elliptic Curve Cryptography
6
Elliptic Curve Cryptography in Practice
16
IMAGE ENCRYPTION AND DECRYPTION USING ELLIPTIC CURVE CRYPTOGRAPHY
8