Login / Signup
On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards.
Ahmad Boorghany
Siavash Bayat Sarmadi
Rasool Jalili
Published in:
ACM Trans. Embed. Comput. Syst. (2015)
Keyphrases
</>
smart card
information security
digital signature
secure communication
secret key
security analysis
authentication scheme
security requirements
java card
packet filtering
differential power analysis
remote user authentication scheme
security mechanisms
authentication protocol