2010 IEEE Student Conference on Research and Development (SCOReD) 2010
DOI: 10.1109/scored.2010.5703995
|View full text |Cite
|
Sign up to set email alerts
|

The implementation of Elliptic Curve binary finite field (F<inf>2m</inf>) for the global smart card

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…This advantage increases when stronger security systems become mandated and devices get smaller. The comparison of the RSA and ECC on different key lengths is shown in [1]. The authors presented a parameter, the key size ratio, defined as the ratio of ECC key size over RSA key size.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…This advantage increases when stronger security systems become mandated and devices get smaller. The comparison of the RSA and ECC on different key lengths is shown in [1]. The authors presented a parameter, the key size ratio, defined as the ratio of ECC key size over RSA key size.…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%