Selecting elliptic curves for cryptography: an efficiency and security analysis
Crossref DOI link: https://doi.org/10.1007/s13389-015-0097-y
Published Online: 2015-05-01
Published Print: 2016-11
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Bos, Joppe W.
Costello, Craig
Longa, Patrick
Naehrig, Michael
Text and Data Mining valid from 2015-05-01