Login / Signup
) elliptic curve cryptography processors.
Mohammed Benaissa
Wei Ming Lim
Published in:
IEEE Trans. Very Large Scale Integr. Syst. (2006)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
security analysis
authentication scheme
digital watermark
high security
error correction
public key cryptography
image processing operations
smart card
digital signature
watermarking scheme
user authentication