Login / Signup
Use of Elliptic Curves in Cryptography.
Victor S. Miller
Published in:
CRYPTO (1985)
Keyphrases
</>
elliptic curve
public key cryptography
elliptic curve cryptography
scalar multiplication
digital signature
cellular automata
key management
modular exponentiation
diffie hellman
public key
power analysis
public key cryptosystems
efficient computation
web services
similarity measure
information security