Path
Home
News
The Centre
Research Groups
People
Projects
Publications
Tech Reports
Open Positions
Events
How to get to CISUC
Member Access
Degenerate Curve Attacks: Extending Invalid Curve Attacks to Edwards Curves and Other Models
Authors
Samuel Neves
Mehdi Tibouchi
Journal
IET Information Security 2017
DOI
Cited by
No citations found