The state of elliptic curve cryptography
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
A secure remote health monitoring model for early disease diagnosis in cloud-based IoT environment
S Akhbarifar, HHS Javadi, AM Rahmani… - Personal and Ubiquitous …, 2023 - Springer
Abstract Internet of Things (IoT) and smart medical devices have improved the healthcare
systems by enabling remote monitoring and screening of the patients' health conditions …
systems by enabling remote monitoring and screening of the patients' health conditions …
[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
[图书][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
[图书][B] An Introduction to Cryptography
An Introduction to Cryptography | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …
Account Menu Find a journal Publish with us Track your research Search Cart Book cover An …
[图书][B] Elliptic curves: number theory and cryptography
LC Washington - 2008 - taylorfrancis.com
Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …
Edition develops the theory of elliptic curves to provide a basis for both number theoretic and …
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
N Courtois, A Klimov, J Patarin, A Shamir - International Conference on …, 2000 - Springer
The security of many recently proposed cryptosystems is based on the difficulty of solving
large systems of quadratic multivariate polynomial equations. This problem is NP-hard over …
large systems of quadratic multivariate polynomial equations. This problem is NP-hard over …
[图书][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
[图书][B] Introduction to cryptography
J Buchmann - 2004 - Springer
Cryptography is a key technology in electronic key systems. It is used to keep data secret,
digitally sign documents, access control, and so forth. Users therefore should not only know …
digitally sign documents, access control, and so forth. Users therefore should not only know …