Login / Signup
Hyper-and-elliptic-curve cryptography.
Daniel J. Bernstein
Tanja Lange
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
elliptic curve cryptography
public key
elliptic curve
cryptographic algorithms
authentication scheme
security analysis
high security
error correction
public key cryptography
digital watermark
computational efficiency
image encryption