Use of elliptic curve cryptography for multimedia encryption
β Scribed by Mowafi, Moad; Tawalbeh, Lo'ai; Aljoby, Walid
- Book ID
- 120599792
- Publisher
- The Institution of Engineering and Technology
- Year
- 2013
- Tongue
- English
- Weight
- 1000 KB
- Volume
- 7
- Category
- Article
- ISSN
- 1751-8709
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
## Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless. Recent cryptanalytic advances have caused increased discussion about public key sizes and the security required. One
The Complex Multiplication (CM) method is a method frequently used for the generation of elliptic curves (ECs) over a prime field F p . The most demanding and complex step of this method is the computation of the roots of a special type of class polynomials, called Hilbert polynomials. However, ther