Login / Signup
A Fully Pipelined High-Performance Elliptic Curve Cryptography Processor for NIST P-256.
Han Yan
Shuai Chen
Junying Huang
Jing Ye
Huawei Li
Xiaowei Li
Published in:
ETS (2024)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
authentication scheme
security analysis
distributed memory
public key cryptography
error correction
digital watermark
data flow
high security
smart card
wireless networks
conflict resolution