The implementation of elliptic curve cryptosystems
- 18 June 2005
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Use of Elliptic Curves in CryptographyPublished by Springer Nature ,2000
- N Using RSA with Low Exponent in a Public Key NetworkPublished by Springer Nature ,2000
- Optimal normal bases in GF(pn)Discrete Applied Mathematics, 1989
- Low complexity normal basesDiscrete Applied Mathematics, 1989
- A high speed data encryption processor for public key cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1989
- Speeding the Pollard and elliptic curve methods of factorizationMathematics of Computation, 1987
- Elliptic curve cryptosystemsMathematics of Computation, 1987
- A Course in Number Theory and CryptographyPublished by Springer Nature ,1987
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- New directions in cryptographyIEEE Transactions on Information Theory, 1976