Login / Signup

Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks.

Turki F. Al-Somani
Published in: Int. J. Inf. Comput. Secur. (2008)
Keyphrases
  • scalar multiplication
  • elliptic curve
  • parallel computation
  • smart card
  • secure communication
  • security requirements