Research Article

Citations for "Theory and Implementation of Elliptic Curve Cryptography"


Citation to this article as recorded by ASCI logo


Abomhara, M., O.O. Khalifa, O. Zakaria, A.A. Zaidan, B.B. Zaidan and H.O. Alanazi, 2010. Suitability of using symmetric key to secure multimedia data: An overview. J. Applied Sci., 10: 1656-1661.
CrossRef  |  Direct Link  |  

Al-Alak S., Z. Zukranian, A. Abdullah and S. Subramiam, 2012. Authentication time of IEEE 802.15.4 with multiple-key protocol using distributed message authentication code algorithm. Res. J. Inform. Technol., 4: 140-154.
CrossRef  |  Direct Link  |  

Al-Alak, S., Z. Zukarnain, A. Abdullah and S. Subramiam, 2013. Randomness improvement of AES using MKP. Res. J. Inf. Technol., 5: 24-34.
CrossRef  |  Direct Link  |  

Janakiraman, S., K. Thenmozhi, J.B.B. Rayappan and R. Amirtharajan, 2014. Compiler optimization and plain text pre-processing to hoist the height of HIGHT in AVR platform. Res. J. Inform. Technol., 6: 356-367.
CrossRef  |  Direct Link  |  

Janakiraman, S., R. Amirtharajan, K. Thenmozhi and J.B.B. Rayappan, 2012. Firmware for data security: A review. Res. J. Inform. Technol., 4: 61-72.
CrossRef  |  Direct Link  |  

Meng, B., 2012. Automatic formal framework of coercion-resistance in internet voting protocols with CryptoVerif in computational model. Inform. Technol. J., 11: 741-750.
CrossRef  |  Direct Link  |  

Olorunfemi, T.O.S., B.K. Alese, S.O. Falaki and O. Fajuyigbe, 2007. Implementation of elliptic curve digital signature algorithms. J. Software Eng., 1: 1-12.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Elliptic curve elgamal encryption and signature schemes. Inform. Technol. J., 4: 299-306.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Secure implementation of message digest, authentication and digital signature. Inform. Technol. J., 4: 204-221.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Security of the cryptographic protocols based on discrete logarithm problem. J. Applied Sci., 5: 1692-1712.
CrossRef  |  Direct Link  |  

Rabah, K., 2005. Theory and implementation of data encryption standard: A review. Inform. Technol. J., 4: 307-325.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Elliptic curve cryptography over binary finite field GF (2m). Inform. Technol. J., 5: 204-229.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Implementing secure RSA cryptosystems using your own cryptographic JCE provider. J. Applied Sci., 6: 482-510.
CrossRef  |  Direct Link  |  

Zaidan, A.A., B.B. Zaidan, A.K. Al-Frajat and H.A. Jalab, 2010. An overview: Theoretical and mathematical perspectives for advance encryption standard/rijndael. J. Applied Sci., 10: 2161-2167.
CrossRef  |  Direct Link  |  


Citations in impact factor journal as recorded by Crossref logo


The physiological mechanisms underlying the ability of Cistus monspeliensis L. from São Domingos mine to withstand high Zn concentrations in soils
Ecotoxicology and Environmental Safety

The potentiality of cross-linked fungal chitosan to control water contamination through bioactive filtration
International Journal of Biological Macromolecules

High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems
Microelectronics Journal


Citation to this article as recorded by Crossref logo


Comparative study on electrocardiogram encryption using elliptic curves cryptography and data encryption standard for applications in Internet of medical things
Concurrency and Computation: Practice and Experience

Multipath TCP security over different attacks
Transactions on Emerging Telecommunications Technologies Vol. 31, Issue 9, , 2020

Ultrasound Imaging of the Hepatobiliary System and Pancreas
Veterinary Clinics of North America: Small Animal Practice Vol. 46, Issue 3, 453, 2016

Short Term Influence of Organic and Inorganic Fertilizer on Soil Microbial Biomass and DNA in Summer and Spring
Journal of Northeast Agricultural University (English Edition) Vol. 23, Issue 1, 20, 2016

Simultaneous Determination of Hexoestrol, Diethylstilbestrol, Estrone and 17-Beta-estradiol in Feed by Gas Chromatography-mass Spectrometry
Journal of Northeast Agricultural University (English Edition) Vol. 23, Issue 1, 44, 2016

Genetic diversity and population structure of ‘Khao Kai Noi’, a Lao rice (<i>Oryza sativa</i> L.) landrace, revealed by microsatellite DNA markers
Breeding Science Vol. 66, Issue 2, 204, 2016

Implementation of Elliptic Curve Diffie-Hellman and EC Encryption Schemes
Information Technology Journal Vol. 4, Issue 2, 132, 2005

Secure Implementation of Message Digest, Authentication and Digital Signature
Information Technology Journal Vol. 4, Issue 3, 204, 2005

Elliptic curve elgamal encryption and signature schemes.
Information Technology Journal Vol. 4, Issue 3, 299, 2005

Elliptic Curve Cryptography over Binary Finite Field GF(2m)
Information Technology Journal Vol. 5, Issue 1, 204, 2006

Security of the cryptographic protocols based on discrete logarithm problem.
Journal of Applied Sciences Vol. 5, Issue 9, 1692, 2005

Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider
Journal of Applied Sciences Vol. 6, Issue 3, 482, 2006

Suitability of Using Symmetric Key to Secure Multimedia Data: An Overview
Journal of Applied Sciences Vol. 10, Issue 15, 1656, 2010

An Overview: Theoretical and Mathematical Perspectives for Advance Encryption Standard/Rijndael
Journal of Applied Sciences Vol. 10, Issue 18, 2161, 2010

Implementation of Elliptic Curve Digital Signature Algorithms
Journal of Software Engineering Vol. 1, Issue 1, 1, 2007

Firmware for Data Security: A Review
Research Journal of Information Technology Vol. 4, Issue 3, 61, 2012

A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks Using Elliptic Curve Cryptography
International Journal of Communications, Network and System Sciences Vol. 03, Issue 04, 369, 2010

Services
Related Articles in ASCI
Search in Google Scholar
View Citation
Report Citation

 
©  2022 Science Alert. All Rights Reserved