Published in

Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14

DOI: 10.1145/2660267.2660370

Links

Tools

Export citation

Search in Google Scholar

Verifying Curve25519 Software

This paper is made freely available by the publisher.
This paper is made freely available by the publisher.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO