Date: 2006-03-21 11:54:32Cryptography Abstract algebra Algebra Finite fields Elliptic curve cryptography Computational hardness assumptions Group theory Public-key cryptography Elliptic-curve cryptography Elliptic curve Key size Discrete logarithm | | On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cpAdd to Reading ListSource URL: www.hyperelliptic.orgDownload Document from Source Website File Size: 227,31 KBShare Document on Facebook
|