Selecting elliptic curves for cryptography: an efficiency and security analysis.
Joppe W. BosCraig CostelloPatrick LongaMichael NaehrigPublished in: J. Cryptogr. Eng. (2016)
Keyphrases
- security analysis
- elliptic curve cryptography
- elliptic curve
- public key
- public key cryptography
- smart card
- security model
- high security
- image encryption
- security properties
- security requirements
- authentication scheme
- user authentication
- digital signature
- diffie hellman
- encryption scheme
- efficient computation
- secure communication
- digital watermark
- real time
- key management
- information systems