Login / Signup

) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.

Soonhak KwonTaekyoung KwonYoung-Ho Park
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
  • elliptic curve cryptography
  • elliptic curve
  • authentication scheme
  • public key
  • security analysis
  • multiresolution