Login / Signup

How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method.

Yoo-Jin BaekIhor Vasyltsov
Published in: ISPEC (2007)
Keyphrases
  • scalar multiplication
  • power analysis
  • computationally efficient
  • elliptic curve
  • computational efficiency
  • key technologies