Login / Signup
Public key cryptography based on some extensions of group.
Ali Abdallah
Published in:
CoRR (2016)
Keyphrases
</>
public key cryptography
public key
elliptic curve
public key infrastructure
elliptic curve cryptography
authentication and key agreement
information systems
third party
security analysis
security model
security services