Login / Signup

A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.

Chae Hoon Lim
Published in: ACISP (2004)
Keyphrases
  • numerical methods
  • similarity measure
  • computational complexity
  • low cost
  • digital watermarking