Login / Signup
An overview of trace based public key cryptography over finite fields.
Ersan Akyildiz
Muhammad Ashraf
Published in:
J. Comput. Appl. Math. (2014)
Keyphrases
</>
public key cryptography
public key
elliptic curve
authentication and key agreement
public key infrastructure
provably secure
elliptic curve cryptography
security model
digital signature
database
security services