Login / Signup
) Using a Normal Basis for Elliptic Curve Cryptography.
Soonhak Kwon
Kris Gaj
Chang Hoon Kim
Chun Pyo Hong
Published in:
CHES (2004)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
high security
security analysis
authentication scheme
public key cryptography
multimedia
digital libraries
digital images
signal processing
image compression
digital watermark