Description: This book is intended as a guide for security professionals, developers, and
those interested in learning how elliptic curve cryptography can be deployed to secure
applications.
To Search:
- [2] - Backpack and the elliptic curve based on
File list (Check if you may need any files):
elliptic_crypto.pdf