Login / Signup
Composite field multiplier based on look-up table for elliptic curve cryptography implementation.
Marisa W. Paryasto
Budi Rahardjo
Fajar Yuliawan
Intan Muchtadi-Alamsyah
Kuspriyanto
Published in:
ICEEI (2011)
Keyphrases
</>
hardware implementation
elliptic curve cryptography
digital watermark
security analysis
high security