Login / Signup
Elliptic and Hyperelliptic Curves: a Practical Security Analysis.
Joppe W. Bos
Craig Costello
Andrea Miele
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security model
high security
image encryption
authentication protocol
user authentication
security properties
encryption scheme
proxy signature scheme
authentication scheme
data structure
encryption algorithm
private key