Login / Signup

Composite field multiplier based on look-up table for elliptic curve cryptography implementation.

Marisa W. ParyastoBudi RahardjoFajar YuliawanIntan Muchtadi-Alamsyah Kuspriyanto
Published in: ICEEI (2011)
Keyphrases
  • hardware implementation
  • elliptic curve cryptography
  • digital watermark
  • security analysis
  • high security