
| index | Title |
| 1 | High-performance hardware architecture of elliptic curve cryptography processor over GF(2163 Author(s):Yong-ping DAN, Xue-cheng ZOU, Zhen... Clicked:7425 Download:4552 Cited:5 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.301-310 DOI:10.1631/jzus.A0820024 |
| 2 | Self-certified multi-proxy signature schemes with message recovery Author(s):Tzong-sun WU, Chien-lung HSU, Han-... Clicked:7629 Download:4393 Cited:8 <Full Text> Journal of Zhejiang University Science A 2009 Vol.10 No.2 P.290-300 DOI:10.1631/jzus.A0820202 |
| 3 | A low-power and low-energy flexible GF(p) elliptic-curve cryptography processor Author(s):Hamid Reza Ahmadi, Ali Afzali-Kusha Clicked:10318 Download:4014 Cited:8 <Full Text> Journal of Zhejiang University Science C 2010 Vol.11 No.9 P.724-736 DOI:10.1631/jzus.C0910660 |
| 4 | Efficient and secure three-party authenticated key exchange protocol for mobile environments Author(s):Chih-ho Chou, Kuo-yu Tsai, Tzong-c... Clicked:8381 Download:4052 Cited:1 <Full Text> Journal of Zhejiang University Science C 2013 Vol.14 No.5 P.347-355 DOI:10.1631/jzus.C1200273 |
| 5 | Low-computation certificateless hybrid signcryption scheme Author(s):Hui-fang Yu, Bo Yang Clicked:10340 Download:4334 Cited:0 <Full Text> <PPT> 2663 Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.7 P.928-940 DOI:10.1631/FITEE.1601054 |
| 6 | Side-channel attacks and learning-vector quantization Author(s):Ehsan Saeedi, Yinan Kong, Md. Seli... Clicked:10786 Download:4873 Cited:0 <Full Text> Frontiers of Information Technology & Electronic Engineering 2017 Vol.18 No.4 P.511-518 DOI:10.1631/FITEE.1500460 |