About 174 item dissertation in line with Elliptic Curve Cryptography query results,the following is 1 to 50(Search took 0.081 seconds)

  1. Big Data Encryption Algorithm Based on Data Deduplication Technology,WangMengMeng/,0/344
  2. Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
  3. Design of Password-based Authenticated Key Agreement Protocols,TangHongBin/University of Electronic Science and Technology,0/285
  4. Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
  5. Research on real time monitoring wireless sensor network system of artillery,XuFeng/Nanjing University of Technology and Engineering,0/3
  6. Research and Design A Configurable Processor for Elliptic Curve Cryptography Algorithm,ZhouFaWang/Tianjin University,0/22
  7. Research and Improvement on Elliptic Curve Scalar Multiplication Algorithm,HeBin/Harbin Institute of Technology,0/7
  8. Research of Fast Scalar Multiplication Algorithms on Elliptic Curve,ZhangHaiLing/Yangzhou University,0/17
  9. Research of Secure and Fast Scalar Multiplication Algorithms on ECC,YangZuo/Yangzhou University,0/13
  10. Research on Key Management and Authentication Protocol in the Internet of Things,ZhangLi/Xi'an University of Electronic Science and Technology,0/21
  11. Lightweoght Elliptic Curve Cryptography for Wireless Sensor Network,ChuDaLin/Shandong University,0/19
  12. Implementation of Parameters Selectable Elliptic Curve Cryptosystem Based on Prime Fields,WangYan/Xi'an University of Electronic Science and Technology,0/46
  13. Elliptic Curve Cryptography Based Group Signatures and Mplementation on Electronic Cash,AoSiMan/University of Science and Technology of China,0/70
  14. Research of Scalar Multiplication Fast Algorithm on Elliptic Curve Over GF(2~n),ZhangJian/Inner Mongolia University,1/44
  15. The scalar multiplication in Elliptic Curve Cryptography,DengWeiYong/Kunming University of Science and Technology,1/89
  16. Research on Authentication Techniques with Privacy Preserving in Vehicular Ad-hoc Networks,ZhaoJunXing/West China University,0/31
  17. A Dual-Field Algorithm for Elliptic Curve Cryptosystem and Its Hardware Implementation,WangJian/Beijing University,2/475
  18. Research on Off-line Electronic Cash Protocols,PengBing/Huazhong University of Science and Technology,9/430
  19. Study on ECC Based Threshold Cryptography and Its Application--Usage in Intrusion Tolerance,ZhangXianFeng/University of Electronic Science and Technology,2/554
  20. A Research on the Securities of Elliptic Curve Cryptosystems,WangChaoZuo/Wuhan University,12/774
  21. Research on Public-Key Cryptography Based on Elliptic Curve Discrete Logarithm Problem and It’s Algorithm,LiXueJun/Northwestern Polytechnical University,8/648
  22. Elliptic Curve Cryptography and Algorithms,BaiGuoQiang/Xi'an University of Electronic Science and Technology,34/948
  23. Research on Elliptic Curve Cryptography Algorithm and Chip Implementation Method,ChenHuaFeng/Zhejiang University,3/196
  24. The Research on the Key Technologies of Side-Channel Attack Oriented to Cryptographic Chips,ZhangTao/University of Electronic Science and Technology,2/500
  25. Study of Fast and Secure Scalar Multiplication Algorithms on Elliptic Curves,LiuShuangGen/Xi'an University of Electronic Science and Technology,5/244
  26. Elliptic Curve Scalar Multiplication Secure Against Power Analysis Attack,ZhangNing/Xi'an University of Electronic Science and Technology,8/175
  27. Research on Identity Authentication Protocol in Mobile Commerce Based on OTP,WangQin/Beijing Jiaotong University,1/265
  28. The Research and Designs of Fast Hardware Implementation Algorithm for Elliptic Curve Cryptography,SunWanZhong/PLA Information Engineering University,1/216
  29. Research on Key Technology of RFID Middleware,YuJian/South China University of Technology,18/2428
  30. Research on Security Protocols in 3G-WLAN Integrated Network,FuJianQing/Zhejiang University,0/372
  31. Research on Some Key Security Issues for Wireless Sensor Networks,PanJuLong/Zhejiang University,0/511
  32. Research on Certificateless Public Key Cryptography Based on ECC,ZhangRui/Wuhan University,0/172
  33. Research on the Application of the DNA Computation in Cryptoanalysis Based on Discrete Logarithm Problem,ZouShuZuo/Hunan University,1/73
  34. Research on XML Security Technology and Its Application in Electrical Business,CaoLing/Zhejiang University of Technology,1/170
  35. Implementation Research of Koblitz Elliptic Curve Cryptosystem,WangHongXia/Chengdu University of Technology,1/87
  36. Design and Implementation of Elliptic Curve Cryptography over GF(2~m),ZhiMingJie/Shanghai Jiaotong University,3/204
  37. Design and Hardware Implementation of Reconfigurable Elliptic Curve Cryptography over GF(2~m),WeiXueTao/PLA Information Engineering University,4/131
  38. The Research and Simulation of Encryption Scheme for EPON,MengFanShuang/Beijing Jiaotong University,1/197
  39. Research of Anti-Differential Power Analysis for Elliptic Curve Cryptosystems,ZhaoZuo/Zhejiang University,3/113
  40. Research and Implementation of Elliptic Curve Cryptography-Based Combined Public Key Technique,LiJiang/Taiyuan University of Technology,3/157
  41. The Design and Implementation of Distributed Certification Authority System Based on Ad Hoc Network,GaoZhaoFeng/Nanjing University of Aeronautics and Astronautics,0/136
  42. The Study of Digital Signature Based on Elliptic Curve Cryptography,HouAiQin/Northwestern University,2/208
  43. Research for Algorithms and Applications of Elliptic Curve Cryptography,ShiRunHua/Guangxi University,5/253
  44. Research and Implementation of Elliptic Curve Cryptograghy,YuBin/Shenyang University of Technology,4/286
  45. Number of elliptic curve multiplication parallel,WangLiang/Institute of Software,4/124
  46. Research on and Implementation of Secure Elliptic Curve Cryptosystem,ZhangQingSheng/Hefei University of Technology,1/134
  47. Key Technology of Firewall Based on Content Filter,XiRongRong/Shanxi University,9/304
  48. The Research on Campus Card Security-Based on Elliptic Curve Encryption System,YuFan/Xi'an University of Architecture and Technology,0/157
  49. The VLSI Implementation of Elliptic Curve Cryptography IP,TangXueFeng/Zhejiang University,4/143
  50. The Research of Elliptic Curve Cryptosystem over GF(2~n),ChenDeWei/Southwest Jiaotong University,0/115

Total 4 Pages First Previous 1 2 3 4 Next Last

© 2012 www.DissertationTopic.Net  Mobile