Citations in impact factor journals
An ECC-Based Blind Signcryption Scheme for Multiple Digital
Documents Security and Communication Networks |
Citation to this article as recorded by
Shakir, A.C., J. Min and G. Xuemai, 2013. Hastening point multiplication in the ECC. Inform. Technol. J., 12: 1780-1787. CrossRefDirect Link |
Citation to this article as recorded by
Implementation of Elliptic Net Scalar Multiplication Computation for NIST P-192 Curve using Python Journal of Physics: Conference Series Vol. 1933, Issue 1, 012055, 2021 |
How to cite this article
Kefa . Rabah , 2006. Elliptic Curve Cryptography over Binary Finite Field GF(2m). Information Technology Journal, 5: 204-229.
DOI: 10.3923/itj.2006.204.229
URL: https://scialert.net/abstract/?doi=itj.2006.204.229
DOI: 10.3923/itj.2006.204.229
URL: https://scialert.net/abstract/?doi=itj.2006.204.229