Login / Signup

Normal basis multiplication and inversion unit for elliptic curve cryptography.

Jan SchmidtMartin Novotný
Published in: ICECS (2003)
Keyphrases
  • elliptic curve cryptography
  • public key cryptosystems
  • public key
  • security analysis
  • elliptic curve
  • authentication scheme
  • digital watermark
  • high security
  • modular exponentiation