Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module.
Mohamad Ali MehrabiChristophe DocheAlireza JolfaeiPublished in: IEEE Trans. Computers (2020)
Keyphrases
- elliptic curve cryptography
- public key cryptosystems
- elliptic curve
- cryptographic algorithms
- high security
- public key
- security analysis
- authentication scheme
- digital watermark
- public key cryptography
- modular exponentiation
- error correction
- computer systems
- low cost
- encryption scheme
- image encryption
- wireless sensor networks
- digital signature
- encryption algorithm
- security model
- key distribution
- provably secure
- secret key
- digital signal processing
- security protocols
- key management
- security requirements
- network security
- peer to peer