History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 24 total

A cryptographic processor for arbitrary elliptic curves over $GF(2^{m})$. (English)
Int. J. Embed. Syst. 3, No. 4, 241-255 (2008).
1
IACR Cryptology ePrint Archive 2008, 214 (2008).
2
Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs. (English)
IEEE Micro 25, No.02, 52-59 (2005).
3
Sizzle: a standards-based end-to-end security architecture for the embedded internet. (English)
Pervasive Mobile Comput. 1, No. 4, 425-445 (2005).
4
Sizzle: a standards-based end-to-end security architecture for the embedded internet. (English)
Pervasive Mobile Comput. 1, No. 4, 425-445 (2005).
5
Accelerating next-generation public-key cryptosystems on general-purpose cpus (English)
IEEE Micro 25, No. 2, 52-59 (2005).
6
Sizzle: A standards-based end-to-end security architecture for the embedded internet (English)
Pervasive and Mobile Computing 1, No. 4, 425-445 (2005).
7
Sizzle: A standards-based end-to-end security architecture for the embedded internet (Best paper) (English)
PerCom, 247-256 (2005).
8
Energy analysis of public-key cryptography for wireless sensor networks (English)
PerCom, 324-328 (2005).
9
Architectural extensions for elliptic curve cryptography over $GF(2^{m})$ on 8-bit microprocessors (English)
ASAP, 343-349 (2005).
10
Comparing elliptic curve cryptography and RSA on 8-bit CPUs. (English)
Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11‒13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 119-132 (2004).
11
Integrating elliptic curve cryptography into the web’s security infrastructure (English)
WWW (Alternate Track Papers & Posters), 402-403 (2004).
12
A public-key cryptographic processor for RSA and ECC (English)
ASAP, 98-110 (2004).
13
Comparing elliptic curve cryptography and RSA on 8-bit cpus (English)
CHES, 119-132 (2004).
14
Speeding up secure web transactions using elliptic curve cryptography (English)
NDSS (2004).
15
Generic $\text{GF}(2^m)$ arithmetic in software and its application to ECC. (English)
Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9‒11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 79-92 (2003).
16
Generic $GF(2)$ arithmetic in software and its application to ECC (English)
ACISP, 79-92 (2003).
17
A cryptograhpic processor for arbitrary elliptic curves over (English)
ASAP, 444-454 (2003).
18
An end-to-end systems approach to elliptic curve cryptography. (English)
Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 349-365 (2002).
Classification: E.4 E.3 C.1
19
Performance analysis of elliptic curve cryptography for SSL (English)
Workshop on Wireless Security, 87-94 (2002).
20
first | previous | 1 21 | next | last

Result 1 to 20 of 24 total