A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Volume: 6 Number: 2 January 2, 2012
EN

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Abstract

A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY

Keywords

References

  1. Miller, Victor S. "Elliptic Curves and their use in Cryptography" DIMACS Workshop on Unusual Applications of Number Theory, 21 March 1997
  2. Win, Erik De and Preneel, "Elliptic Curve Public Key Cryptosystems-an introduction" State of the Art in Applied Cryptography 1997 pp.131-141
  3. Stinson, Douglas R. Cryptography: Theory and Practice. CRC Press, 1995, and 2002(second edition).
  4. Wade Trappe&Lawrence C. Washington, Introduction to Cryptography with Coding Theory. Prentice-Hall, 2002
  5. Juristic, A. and Menezes, A. "Elliptic Curves and Cryptography." Dr. Dobb's Journal, April Johnson, D. and Menezes, A. "The Elliptic Curve Digital Signature Algorithm" Technical Report. CORR 99-34, Dep. Of C&O, University of Waterloo, Canada. Aug.23, 1999 Update: Feb. , 2000
  6. Michael Rosing, Implementing Elliptic Curve Cryptography. Manning Publications Co. 1999
  7. Dr. Michael J Ganley, Elliptic Curve Cryptography, Thales e-Security Limited, 2001
  8. William Stallings, Cryptography and Network Security, Principles and Practice. Prentice-Hall 1999 (Second Edition)

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

M.ali Aydın This is me

Publication Date

January 2, 2012

Submission Date

January 2, 2012

Acceptance Date

-

Published in Issue

Year 2006 Volume: 6 Number: 2

APA
Aydın, M., & Aydın, G. (2012). A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering, 6(2), 211-221. https://izlik.org/JA74UU24CW
AMA
1.Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6(2):211-221. https://izlik.org/JA74UU24CW
Chicago
Aydın, M.ali, and G.zeynep Aydın. 2012. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6 (2): 211-21. https://izlik.org/JA74UU24CW.
EndNote
Aydın M, Aydın G (January 1, 2012) A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering 6 2 211–221.
IEEE
[1]M. Aydın and G. Aydın, “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”, IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, pp. 211–221, Jan. 2012, [Online]. Available: https://izlik.org/JA74UU24CW
ISNAD
Aydın, M.ali - Aydın, G.zeynep. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering 6/2 (January 1, 2012): 211-221. https://izlik.org/JA74UU24CW.
JAMA
1.Aydın M, Aydın G. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering. 2012;6:211–221.
MLA
Aydın, M.ali, and G.zeynep Aydın. “A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY”. IU-Journal of Electrical & Electronics Engineering, vol. 6, no. 2, Jan. 2012, pp. 211-2, https://izlik.org/JA74UU24CW.
Vancouver
1.M.ali Aydın, G.zeynep Aydın. A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY. IU-Journal of Electrical & Electronics Engineering [Internet]. 2012 Jan. 1;6(2):211-2. Available from: https://izlik.org/JA74UU24CW