Login / Signup

Look-Up Table Based Large Finite Field Multiplication in Memory Constrained Cryptosystems.

M. Anwarul Hasan
Published in: IMACC (1999)
Keyphrases
  • memory usage
  • random access
  • elliptic curve
  • genetic algorithm
  • memory requirements
  • finite number
  • memory space
  • limited memory
  • public key cryptosystems