Login / Signup
Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks.
Turki F. Al-Somani
Published in:
Int. J. Inf. Comput. Secur. (2008)
Keyphrases
</>
scalar multiplication
elliptic curve
parallel computation
smart card
secure communication
security requirements