Login / Signup
Implementing a feasible attack against ECC2K-130 certicom challenge (abstract only).
Ahmad Lavasani
Reza Mohammadi
Published in:
ACM Commun. Comput. Algebra (2008)
Keyphrases
</>
higher level
feasible solution
high level
error correction
attack detection
artificial intelligence
low level
efficient implementation
encryption algorithm