Login / Signup
Constructive and Destructive Use of Compilers in Elliptic Curve Cryptography.
Manuel Barbosa
Andrew Moss
Dan Page
Published in:
J. Cryptol. (2009)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
authentication scheme
security analysis
cryptographic algorithms
digital watermark
error correction
high security
public key cryptography
digital images
computer systems
watermarking scheme
user authentication
digital signature