Login / Signup
Key generation based on elliptic curve over finite prime field.
S. Maria Celestin Vigila
K. Muneeswaran
Published in:
Int. J. Electron. Secur. Digit. Forensics (2012)
Keyphrases
</>
elliptic curve
scalar multiplication
digital signature
elliptic curve cryptography
key management
efficient computation
diffie hellman
public key cryptography
end to end
java card
power analysis
public key cryptosystems