PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: biology

楕円曲線暗号 - Fujitsu

First, we outline the principle of ECC, and describe a typical digital signature algorithm. To explain the security of ECC, we also report on the latest attacks on ECC. Then, we describe the results of our study concerning safe parameter generation for ECC and the fast implementation of ECC using software and a digital signal processorDSP).

Tags:

  Processor, Signal, Digital, Fujitsu, Digital signal processor

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Related search queries