On the Complexity of Attacking Elliptic Curve Based Authentication Chips.
Ievgen KabinZoya DykaDan KlannJan SchäffnerPeter LangendoerferPublished in: CoRR (2022)
Keyphrases
- elliptic curve
- elliptic curve cryptography
- public key cryptography
- scalar multiplication
- key agreement
- digital signature
- key distribution
- key management
- computational complexity
- diffie hellman
- digital images
- authentication scheme
- efficient computation
- security analysis
- public key
- error correction
- public key cryptosystems