Login / Signup
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks.
Bodo Möller
Published in:
ISC (2001)
Keyphrases
</>
elliptic curve
public key cryptosystems
modular exponentiation
scalar multiplication
digital signature
diffie hellman
public key cryptography
elliptic curve cryptography
information security
efficient computation
key management
java card
smart card
formal model
multi party
end to end
computational complexity