Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis.
Joppe W. BosCraig CostelloPatrick LongaMichael NaehrigPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- elliptic curve cryptography
- security analysis
- elliptic curve
- public key
- public key cryptography
- smart card
- security model
- high security
- digital signature
- security requirements
- security properties
- image encryption
- diffie hellman
- key management
- user authentication
- private key
- authentication scheme
- information security
- authentication protocol
- encryption scheme
- key distribution
- key exchange