Login / Signup
An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost.
Junfeng Fan
Ingrid Verbauwhede
Published in:
Cryptography and Security (2012)
Keyphrases
</>
countermeasures
security measures
information security
security analysis
security requirements
rural areas
power analysis
security issues
java card
sql injection
computer security
information technology
security mechanisms
elliptic curve
cyber attacks