Resisting HODPA attacks in modular exponentiation using inner product with differential evolution.
Hridoy Jyoti MahantaAjoy Kumar KhanSomnath MukhopadhyayPublished in: Innov. Syst. Softw. Eng. (2021)
Keyphrases
- differential evolution
- modular exponentiation
- addition chains
- watermarking algorithm
- evolutionary algorithm
- secure communication
- optimization algorithm
- differential evolution algorithm
- particle swarm optimization
- key exchange
- digital signal processing
- security protocols
- particle swarm optimization pso
- numerical optimization problems
- genetic algorithm
- parameter optimization
- elliptic curve
- global optimization problems
- image processing
- signal processing
- multi objective
- control system
- security mechanisms
- control strategy
- public key cryptography
- smart card