Trading Inversions for Multiplications in Elliptic Curve Cryptography.
Mathieu CietMarc JoyeKristin E. LauterPeter L. MontgomeryPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- elliptic curve cryptography
- elliptic curve
- public key
- authentication scheme
- modular exponentiation
- security analysis
- public key cryptography
- error correction
- high security
- digital watermark
- digital signature
- smart card
- authentication protocol
- image encryption
- digital images
- key management
- encryption scheme
- secret key
- discrete wavelet transform