![Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm](https://www.pdfsearch.io/img/84487eb9f53b5a88bfe644d3e73516ca.jpg) Date: 2006-03-21 11:54:32Cryptography Abstract algebra Algebra Finite fields Elliptic curve cryptography Computational hardness assumptions Group theory Public-key cryptography Elliptic-curve cryptography Elliptic curve Key size Discrete logarithm | | On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cpAdd to Reading ListSource URL: www.hyperelliptic.orgDownload Document from Source Website File Size: 227,31 KBShare Document on Facebook
|