) multiplication and its application in elliptic curve cryptography.
William N. CheltonMohammed BenaissaPublished in: IET Circuits Devices Syst. (2008)
Keyphrases
- elliptic curve cryptography
- public key cryptosystems
- elliptic curve
- public key
- security analysis
- authentication scheme
- modular exponentiation
- digital watermark
- error correction
- high security
- public key cryptography
- wireless sensor networks
- digital signature
- image processing
- encryption algorithm
- user authentication