Login / Signup
How to Hash into Elliptic Curves.
Thomas Icart
Published in:
CRYPTO (2009)
Keyphrases
</>
elliptic curve
scalar multiplication
hash functions
elliptic curve cryptography
digital signature
diffie hellman
public key cryptography
data structure
key management
key distribution
b tree
modular exponentiation
computationally efficient
smart card
efficient computation
public key cryptosystems