• Citations Per Year
Learn More
In this paper, we have presented a new method for computing the best-fitted rectangle for closed regions using their boundary points. The vertices of the best-fitted rectangle are computed using a bisection method starting with the upper-estimated rectangle and the under-estimated rectangle. The vertices of the upper- and under-estimated rectangles are(More)
Elliptic curve cryptography recently gained a lot attention in industry. The performance of elliptic curve cryptosystem heavily depends on an operation called point multiplication. Here we proposed a new point multiplication method using modified base representation. We devised two algorithms for the method and analyzed the complexity of the method. The(More)
  • 1