About 174 item dissertation in line with Elliptic Curve Cryptography query results,the following is 1 to 50(Search took 0.081 seconds)
 Big Data Encryption Algorithm Based on Data Deduplication Technology,WangMengMeng/,0/344
 Design for Unified Architecture ECC and RSA Cryptographic Processor,LiuBing/Tianjin University,0/1
 Design of Passwordbased Authenticated Key Agreement Protocols,TangHongBin/University of Electronic Science and Technology,0/285
 Research on Security Protocols for RFID Systems,ZhouJingXian/Beijing University of Posts and Telecommunications,0/46
 Research on real time monitoring wireless sensor network system of artillery,XuFeng/Nanjing University of Technology and Engineering,0/3
 Research and Design A Configurable Processor for Elliptic Curve Cryptography Algorithm,ZhouFaWang/Tianjin University,0/22
 Research and Improvement on Elliptic Curve Scalar Multiplication Algorithm,HeBin/Harbin Institute of Technology,0/7
 Research of Fast Scalar Multiplication Algorithms on Elliptic Curve,ZhangHaiLing/Yangzhou University,0/17
 Research of Secure and Fast Scalar Multiplication Algorithms on ECC,YangZuo/Yangzhou University,0/13
 Research on Key Management and Authentication Protocol in the Internet of Things,ZhangLi/Xi'an University of Electronic Science and Technology,0/21
 Lightweoght Elliptic Curve Cryptography for Wireless Sensor Network,ChuDaLin/Shandong University,0/19
 Implementation of Parameters Selectable Elliptic Curve Cryptosystem Based on Prime Fields,WangYan/Xi'an University of Electronic Science and Technology,0/46
 Elliptic Curve Cryptography Based Group Signatures and Mplementation on Electronic Cash,AoSiMan/University of Science and Technology of China,0/70
 Research of Scalar Multiplication Fast Algorithm on Elliptic Curve Over GF(2~n),ZhangJian/Inner Mongolia University,1/44
 The scalar multiplication in Elliptic Curve Cryptography,DengWeiYong/Kunming University of Science and Technology,1/89
 Research on Authentication Techniques with Privacy Preserving in Vehicular Adhoc Networks,ZhaoJunXing/West China University,0/31
 A DualField Algorithm for Elliptic Curve Cryptosystem and Its Hardware Implementation,WangJian/Beijing University,2/475
 Research on Offline Electronic Cash Protocols,PengBing/Huazhong University of Science and Technology,9/430
 Study on ECC Based Threshold Cryptography and Its ApplicationUsage in Intrusion Tolerance,ZhangXianFeng/University of Electronic Science and Technology,2/554
 A Research on the Securities of Elliptic Curve Cryptosystems,WangChaoZuo/Wuhan University,12/774
 Research on PublicKey Cryptography Based on Elliptic Curve Discrete Logarithm Problem and It’s Algorithm,LiXueJun/Northwestern Polytechnical University,8/648
 Elliptic Curve Cryptography and Algorithms,BaiGuoQiang/Xi'an University of Electronic Science and Technology,34/948
 Research on Elliptic Curve Cryptography Algorithm and Chip Implementation Method,ChenHuaFeng/Zhejiang University,3/196
 The Research on the Key Technologies of SideChannel Attack Oriented to Cryptographic Chips,ZhangTao/University of Electronic Science and Technology,2/500
 Study of Fast and Secure Scalar Multiplication Algorithms on Elliptic Curves,LiuShuangGen/Xi'an University of Electronic Science and Technology,5/244
 Elliptic Curve Scalar Multiplication Secure Against Power Analysis Attack,ZhangNing/Xi'an University of Electronic Science and Technology,8/175
 Research on Identity Authentication Protocol in Mobile Commerce Based on OTP,WangQin/Beijing Jiaotong University,1/265
 The Research and Designs of Fast Hardware Implementation Algorithm for Elliptic Curve Cryptography,SunWanZhong/PLA Information Engineering University,1/216
 Research on Key Technology of RFID Middleware,YuJian/South China University of Technology,18/2428
 Research on Security Protocols in 3GWLAN Integrated Network,FuJianQing/Zhejiang University,0/372
 Research on Some Key Security Issues for Wireless Sensor Networks,PanJuLong/Zhejiang University,0/511
 Research on Certificateless Public Key Cryptography Based on ECC,ZhangRui/Wuhan University,0/172
 Research on the Application of the DNA Computation in Cryptoanalysis Based on Discrete Logarithm Problem,ZouShuZuo/Hunan University,1/73
 Research on XML Security Technology and Its Application in Electrical Business,CaoLing/Zhejiang University of Technology,1/170
 Implementation Research of Koblitz Elliptic Curve Cryptosystem,WangHongXia/Chengdu University of Technology,1/87
 Design and Implementation of Elliptic Curve Cryptography over GF(2~m),ZhiMingJie/Shanghai Jiaotong University,3/204
 Design and Hardware Implementation of Reconfigurable Elliptic Curve Cryptography over GF(2~m),WeiXueTao/PLA Information Engineering University,4/131
 The Research and Simulation of Encryption Scheme for EPON,MengFanShuang/Beijing Jiaotong University,1/197
 Research of AntiDifferential Power Analysis for Elliptic Curve Cryptosystems,ZhaoZuo/Zhejiang University,3/113
 Research and Implementation of Elliptic Curve CryptographyBased Combined Public Key Technique,LiJiang/Taiyuan University of Technology,3/157
 The Design and Implementation of Distributed Certification Authority System Based on Ad Hoc Network,GaoZhaoFeng/Nanjing University of Aeronautics and Astronautics,0/136
 The Study of Digital Signature Based on Elliptic Curve Cryptography,HouAiQin/Northwestern University,2/208
 Research for Algorithms and Applications of Elliptic Curve Cryptography,ShiRunHua/Guangxi University,5/253
 Research and Implementation of Elliptic Curve Cryptograghy,YuBin/Shenyang University of Technology,4/286
 Number of elliptic curve multiplication parallel,WangLiang/Institute of Software,4/124
 Research on and Implementation of Secure Elliptic Curve Cryptosystem,ZhangQingSheng/Hefei University of Technology,1/134
 Key Technology of Firewall Based on Content Filter,XiRongRong/Shanxi University,9/304
 The Research on Campus Card SecurityBased on Elliptic Curve Encryption System,YuFan/Xi'an University of Architecture and Technology,0/157
 The VLSI Implementation of Elliptic Curve Cryptography IP,TangXueFeng/Zhejiang University,4/143
 The Research of Elliptic Curve Cryptosystem over GF(2～n),ChenDeWei/Southwest Jiaotong University,0/115
Total 4 Pages First Previous 1 2 3 4 Next Last
© 2012 www.DissertationTopic.Net Mobile
