scientific article; zbMATH DE number 2085202
From MaRDI portal
Publication:4736429
zbMath1067.94525MaRDI QIDQ4736429
Christophe Tymen, David M'Raïhi, Jean-Sébastien Coron
Publication date: 9 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2259/22590151.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Authentication, digital signatures and secret sharing (94A62)
Related Items (3)
Reusing nonces in Schnorr signatures (and keeping it secure...) ⋮ Redundant \(\tau \)-adic expansions. I: Non-adjacent digit sets and their applications to scalar multiplication ⋮ Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic
This page was built for publication: