Login / Signup

Binary and prime field multiplication for public key cryptography on embedded microprocessors.

Hwajeong SeoYeoncheol LeeHyunjin KimTaehwan ParkHowon Kim
Published in: Secur. Commun. Networks (2014)
Keyphrases
  • public key cryptography
  • public key
  • modular exponentiation
  • security model
  • low cost
  • elliptic curve
  • digital libraries
  • authentication and key agreement