Login / Signup
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.
Chae Hoon Lim
Published in:
ACISP (2004)
Keyphrases
</>
numerical methods
similarity measure
computational complexity
low cost
digital watermarking