Login / Signup

) elliptic-curve cryptography processor.

Hamid Reza AhmadiAli Afzali-Kusha
Published in: J. Zhejiang Univ. Sci. C (2010)
Keyphrases
  • elliptic curve cryptography
  • elliptic curve
  • public key
  • security analysis
  • authentication scheme
  • digital watermark
  • high security
  • error correction
  • public key cryptography