Login / Signup
) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
Soonhak Kwon
Taekyoung Kwon
Young-Ho Park
Published in:
ICISC (2005)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
security analysis
authentication scheme
high security
error correction
digital watermark
image processing
access control