Login / Signup

Pollard's rho attack on ECDLP and Threshold Schemes.

K. P. Vidya
Published in: Monte Carlo Methods Appl. (2007)
Keyphrases
  • elliptic curve
  • key agreement
  • countermeasures
  • malicious attacks
  • voronoi diagram
  • provably secure