Login / Signup
Review of Elliptic Curve Cryptography processor designs.
Hamad Marzouqi
Mahmoud Al-Qutayri
Khaled Salah
Published in:
Microprocess. Microsystems (2015)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
authentication scheme
security analysis
digital watermark
high security
error correction
public key cryptography
similarity search
resource constrained
image encryption