Login / Signup
) elliptic-curve cryptography processor.
Hamid Reza Ahmadi
Ali Afzali-Kusha
Published in:
J. Zhejiang Univ. Sci. C (2010)
Keyphrases
</>
elliptic curve cryptography
elliptic curve
public key
security analysis
authentication scheme
digital watermark
high security
error correction
public key cryptography