Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves
Loading...
Date
2008
Other authors
Impact
Journal Title
Journal ISSN
Volume Title
Related resource
Citation
DOI
Journal or Serie
Journal of Research and Practice in Information Technology, 2008, vol. 40, núm. 4, p. 263-273