Login / Signup
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices.
Jan Hajny
Petr Dzurenda
Sara Ricci
Lukas Malina
Kamil Vrba
Published in:
ICUMT (2018)
Keyphrases
</>
elliptic curve cryptography
public key
elliptic curve
authentication scheme
security analysis
mobile devices
high security
error correction
public key cryptography
digital watermark
digital images
smart card
provably secure