| 1 | |
| 2 | == Algunos artículos de referencia == |
| 3 | |
| 4 | * [http://www.ijser.org/researchpaper/Performance-Based-Comparison-Study-of-RSA-and-Elliptic-Curve-Cryptography.pdf Performance Based Comparison Study of RSA and Elliptic Curve Cryptography] |
| 5 | |
| 6 | * [https://www.princeton.edu/~rblee/ELE572Papers/ECCpapers/SUN_ECC_SSLperformance.pdf Performance Analysis of Elliptic Curve Cryptography for SSL] |
| 7 | |
| 8 | * [http://static.ijcsce.org/wp-content/uploads/2013/06/IJCSCESI045113.pdf Comparison of Cryptographic Algorithms: ECC & RSA] |
| 9 | |
| 10 | * [http://www.tml.tkk.fi/Opinnot/Tik-110.501/2000/papers/loikkanen_karu.pdf Practical Comparison of Fast Public-key Cryptosystems] |
| 11 | |
| 12 | |
| 13 | |
| 14 | |
| 15 | |
| 16 | |
| 17 | |
| 18 | |