Abstract: The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication, which is performed ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results