Login / Signup

Generating anomalous elliptic curves.

Franck LeprévostJean MonneratSébastien VarretteSerge Vaudenay
Published in: Inf. Process. Lett. (2005)
Keyphrases
  • elliptic curve
  • anomaly detection
  • scalar multiplication
  • digital signature
  • elliptic curve cryptography
  • diffie hellman
  • public key cryptography
  • power analysis
  • modular exponentiation