This paper will have the usual classical style of a CryptoReversing Approach, what we are going to talk about is ECC also known as Elliptic Curve Cryptography. After a theorial study we will fly to the most common Secured Software Applications with a touch of Hardware Securityware.
Recommended Comments
Create an account or sign in to comment