Login / Signup

Architectures for unified field inversion with applications in elliptic curve cryptography.

Erkay SavasÇetin Kaya Koç
Published in: ICECS (2002)
Keyphrases
  • elliptic curve cryptography
  • authentication scheme
  • security analysis
  • digital watermark