Login / Signup

) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.

Soonhak KwonTaekyoung KwonYoung-Ho Park
Published in: ICISC (2005)
Keyphrases
  • elliptic curve cryptography
  • elliptic curve
  • public key
  • security analysis
  • authentication scheme
  • high security
  • error correction
  • digital watermark
  • image processing
  • access control