×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [4]
北京航空航天大学 [4]
山东大学 [4]
软件研究所 [4]
上海电子信息职业技术... [3]
深圳先进技术研究院 [2]
更多...
内容类型
会议论文 [34]
发表日期
2018 [3]
2017 [1]
2016 [4]
2015 [2]
2014 [2]
2011 [6]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共34条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
会议论文
作者:
Lyu, Chen
;
Pande, Amit
;
Zhang, Yuanyuan
;
Gu, Dawu
;
Mohapatra, Prasant
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/08/22
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF(p)
会议论文
2018 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SAFETY FOR ROBOTICS (ISR), 2018-01-01
作者:
Liu, JianWei
;
Cheng, DongXu
;
Guan, ZhenYu
;
Wang, Ziyu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Elliptic curve cryptography
Montgomery multiplication
Parallel scheduling architecture
Scalar point multiplier
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p)
会议论文
2018 International Conference on Intelligence and Safety for Robotics, ISR 2018
作者:
Liu, J.
;
Guan, Z.
;
Cheng, D.
;
Wang, Z.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Computation theory
Distributed computer systems
Geometry
Integer programming
Integrated circuit design
Multipurpose robots
Public key cryptography
Robotics
VLSI circuits
Elliptic curve cryptography
Elliptic Curve Cryptography (ECC)
Modular inversion algorithms
Modular Multiplication
Montgomery multiplication
Parallel scheduling
Point multipliers
Scalar point multiplication
Speed
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks
会议论文
作者:
Jiang, Qi
;
Kumar, Neeraj
;
Ma, Jianfeng
;
Shen, Jian
;
He, Debiao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/05
Implementation of a Resource-Constrained ECC Processor with Power Analysis Countermeasure
会议论文
IEEE Asia Pacific Conference on Circuits and Systems (APCCAS), Jeju, SOUTH KOREA, OCT 25-28, 2016
作者:
Liu, Zilong
;
Liu, Dongsheng
;
Sun, Xiangcheng
;
Zou, Xuecheng
;
Lin, Hui
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/04
Elliptic Curve Cryptography
power analysis countermeasure
RFID
An improved digital signature algorithm and authentication protocols in cloud platform
会议论文
IEEE International Conference on Smart Cloud (IEEE SmartCloud), 2016-11-18
作者:
Wang, Longge[1]
;
Song, Tao[2]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/23
cloud platform
elliptic curve cryptography
modular inversion
improved algorithm
authentication
A Flexible and Scalable Implementation of Elliptic Curve Cryptography over GF(p) based on ASIP
会议论文
35th IEEE International Performance Computing and Communications Conference (IPCCC), DEC 09-11, 2016
作者:
Qin, Yao
;
Wang, Hua
;
Jia, Zhiping
;
Xia, Hui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/31
elliptic curve cryptography
point multiplication
prime fields
application specific instruction set processor
custom instruction set
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP
会议论文
35th IEEE International Performance Computing and Communications Conference, IPCCC 2016, December 9, 2016 - December 11, 2016
作者:
Qin, Yao
;
Wang, Hua
;
Jia, Zhiping
;
Xia, Hui
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
会议论文
12th IEEE Int Conf Ubiquitous Intelligence & Comp/12th IEEE Int Conf Autonom & Trusted Comp/15th IEEE Int Conf Scalable Comp & Commun & Associated Workshops/IEEE Int Conf Cloud & Big Data Comp/IEEE Int Conf Internet People, Beijing, PEOPLES R CHINA, 2015-08-10
作者:
Wang, Xiang
;
Wang, Liping
;
Bai, Yuanchen
;
He, Zhenxue
;
Wang, Tao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
component
Elliptic Curve Crytography
computation time complexity
Power Analysis Attack
NAF encoding algorithm
Security SoC
Scalar Multiplication algorithm
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
会议论文
9th International Conference on Next Generation Mobile Applications, Services and Technologies, Emmanuel Coll, Univ of Cambridge, Cambridge, UNITED KINGDOM, 2015-01-01
作者:
Li, Xuanang
;
Zheng, Zhiming
;
Zhang, Xiao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
authentication
key agreement
elliptic curve cryptography
password
smartcard
©版权所有 ©2017 CSpace - Powered by
CSpace