Login / Signup
Safe curves for elliptic-curve cryptography.
Daniel J. Bernstein
Tanja Lange
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
cryptographic algorithms
public key
security analysis
high security
authentication scheme
digital watermark
error correction
public key cryptography
security requirements