Login / Signup
) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
Soonhak Kwon
Taekyoung Kwon
Young-Ho Park
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
authentication scheme
public key
security analysis
multiresolution