The Application of ECDSA on Ad-Hoc Networks
碩士 === 長庚大學 === 電機工程研究所 === 95 === Ad-hoc networks present huge security risks. Security issues concerning ad-hoc networks are attracting increasing attention nowadays. There are various challenges that are faced in the ad-hoc environment. These are mostly due to the resource poorness of these netwo...
Main Authors: | Yi-Yin Lai, 賴宜潁 |
---|---|
Other Authors: | Erl-Huei Lu |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/72638301402198803060 |
Similar Items
-
Kleptographic Attacks on ECDSA
by: Nadezhda Anatolievna Chepick, et al.
Published: (2014-12-01) -
On the Applicability of a Cache Side-Channel Attack on ECDSA Signatures : The Flush+Reload attack on the point multiplication in ECDSA signature generation process
by: Josyula, Sai Prashanth
Published: (2015) -
Minerva: The curse of ECDSA nonces Systematic analysis of lattice attacks on noisy leakage of bit-length of ECDSA nonces
by: Jan Jancar, et al.
Published: (2020-08-01) -
Points of High Order on Elliptic Curves : ECDSA
by: Kouchaki Barzi, Behnaz
Published: (2016) -
Undetectable secret key recovery for the ECDSA digital signature algorithm
by: A. V. Kovalev, et al.
Published: (2010-09-01)