Inproceedings,

Elliptic and Hyperelliptic Curves: A Practical Security Analysis.

, , and .
Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 203-220. Springer, (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews