![]() |
Volumn , Issue , 2003, Pages 106-110
|
Message recovery signature scheme using complementary elliptic curves
|
Author keywords
Communication system security; Computer science; Elliptic curve cryptography; Elliptic curves; Equations; Galois fields; H infinity control; Public key; Public key cryptography; Solid modeling
|
Indexed keywords
AUTHENTICATION;
COMPUTATIONAL GEOMETRY;
COMPUTER CONTROL SYSTEMS;
COMPUTER SCIENCE;
CRYPTOGRAPHY;
GEOMETRY;
PUBLIC KEY CRYPTOGRAPHY;
COMMUNICATION SYSTEM SECURITY;
ELLIPTIC CURVE;
ELLIPTIC CURVE CRYPTOGRAPHY;
EQUATIONS;
GALOIS FIELDS;
H -INFINITY CONTROLS;
PUBLIC KEYS;
SOLID MODEL;
CURVE FITTING;
|
EID: 84943602652
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/GMAG.2003.1219673 Document Type: Conference Paper |
Times cited : (1)
|
References (10)
|