Login / Signup
Improving Pollard's Rho attack on elliptic curve cryptosystems.
Siham Ezzouak
Mohammed El Amrani
Abdelmalek Azizi
Published in:
ICMCS (2012)
Keyphrases
</>
elliptic curve
power analysis
key agreement
scalar multiplication
elliptic curve cryptography
diffie hellman
key management
digital signature
efficient computation
public key cryptography
countermeasures
modular exponentiation
public key cryptosystems
key distribution
secret key
java card
security properties