Sign in

On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography.

Takakazu Satoh
Published in: WCC (2005)
Keyphrases
  • elliptic curve cryptography
  • error correction
  • image processing
  • security analysis
  • elliptic curve
  • authentication scheme