Joint operation in public key cryptography
Dragan VidakovicOlivera NikolicDusko ParezanovicJelena KaljevicPublished in: CoRR (2013)
Keyphrases
- public key cryptography
- public key
- modular exponentiation
- elliptic curve
- security model
- security services
- digital signature
- authentication and key agreement
- public key infrastructure
- information systems
- provably secure
- access control
- security analysis
- power consumption
- cost effective
- low cost
- web services
- elliptic curve cryptography