Login / Signup

Implementing a feasible attack against ECC2K-130 certicom challenge (abstract only).

Ahmad LavasaniReza Mohammadi
Published in: ACM Commun. Comput. Algebra (2008)
Keyphrases
  • higher level
  • feasible solution
  • high level
  • error correction
  • attack detection
  • artificial intelligence
  • low level
  • efficient implementation
  • encryption algorithm