Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/18262.25413guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Use of elliptic curves in cryptography

Published: 01 June 1986 Publication History
  • Get Citation Alerts
  • Abstract

    No abstract available.

    Cited By

    View all
    • (2022)SALSAProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3602805(34981-34994)Online publication date: 28-Nov-2022
    • (2022)Public key versus symmetric key cryptography in client–server authentication protocolsInternational Journal of Information Security10.1007/s10207-021-00543-w21:1(103-114)Online publication date: 1-Feb-2022
    • (2021)A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge ProofSecurity and Communication Networks10.1155/2021/55233942021Online publication date: 1-Jan-2021
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
    June 1986
    548 pages
    ISBN:0387164634

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 01 June 1986

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)SALSAProceedings of the 36th International Conference on Neural Information Processing Systems10.5555/3600270.3602805(34981-34994)Online publication date: 28-Nov-2022
    • (2022)Public key versus symmetric key cryptography in client–server authentication protocolsInternational Journal of Information Security10.1007/s10207-021-00543-w21:1(103-114)Online publication date: 1-Feb-2022
    • (2021)A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge ProofSecurity and Communication Networks10.1155/2021/55233942021Online publication date: 1-Jan-2021
    • (2021)A Security Enhanced Blockchain System Supporting Standard Elliptic Curve Digital Signature Algorithm Signature (ECDSA) and SM2 Signature SimultaneouslyProceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering10.1145/3501409.3501504(521-525)Online publication date: 22-Oct-2021
    • (2021)Identity-based Encryption from the Diffie-Hellman AssumptionJournal of the ACM10.1145/342237068:3(1-46)Online publication date: 22-Mar-2021
    • (2021)A Provably Secure and Lightweight Patient-Healthcare Authentication Protocol in Wireless Body Area NetworksWireless Personal Communications: An International Journal10.1007/s11277-020-07237-x117:1(47-69)Online publication date: 1-Mar-2021
    • (2020)Secure and low computation authentication protocol for Wireless Body Area Network with ECC and 2D hash chainProceedings of the International Conference on Research in Adaptive and Convergent Systems10.1145/3400286.3418256(130-135)Online publication date: 13-Oct-2020
    • (2019)An Efficient Date-constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine SystemProceedings of the 3rd International Conference on Medical and Health Informatics10.1145/3340037.3340065(172-177)Online publication date: 17-May-2019
    • (2019)Toxic Friends in Your NetworkProceedings of the 5th ACM Workshop on Security Standardisation Research Workshop10.1145/3338500.3360334(1-12)Online publication date: 11-Nov-2019
    • (2019)FPGA Implementation of the ECC Over GF(2m) for Small Embedded ApplicationsACM Transactions on Embedded Computing Systems10.1145/331035418:2(1-19)Online publication date: 27-Mar-2019
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media