Login / Signup
How to Hash into Elliptic Curves.
Thomas Icart
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
elliptic curve
scalar multiplication
elliptic curve cryptography
hash functions
digital signature
diffie hellman
public key cryptography
key management
efficient computation
data structure
b tree
modular exponentiation
public key cryptosystems
key distribution
power analysis