Securing the Elliptic Curve Montgomery Ladder against Fault Attacks.
Nevine Maurice EbeidRob LambertPublished in: FDTC (2009)
Keyphrases
- elliptic curve
- public key cryptosystems
- java card
- power analysis
- smart card
- elliptic curve cryptography
- information security
- modular exponentiation
- scalar multiplication
- countermeasures
- key management
- digital signature
- key distribution
- diffie hellman
- efficient computation
- security protocols
- security mechanisms
- public key cryptography
- end to end
- computational efficiency
- security properties
- group communication
- key exchange
- security requirements
- watermarking scheme