Login / Signup
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.
Safuat Hamdy
Bodo Möller
Published in:
ASIACRYPT (2000)
Keyphrases
</>
elliptic curve
information security
security issues
cryptographic protocols
security problems
intrusion detection
network security
fuzzy vault
pairwise
access control
sufficient conditions
security systems
private key