Implementing Network Security Protocols based on Elliptic CurveCryptog y (1999)

by M. Aydos , E. Savas , C. K. Koc , Ç. K. Koç
Venue:Proceedings of the Fourth Symposium on Computer Networks
Citations:12 - 1 self