Login / Signup
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning.
Marcin Aftowicz
Ievgen Kabin
Zoya Dyka
Peter Langendörfer
Published in:
Future Internet (2024)
Keyphrases
</>
scalar multiplication
elliptic curve
power analysis
key agreement
digital signature
low cost
secret key
real time
secure communication
diffie hellman
key management
key distribution
computational efficiency
computer networks
countermeasures
ciphertext