Login / Signup
Dummy operations in scalar multiplication over elliptic curves: A tradeoff between security and performance.
Simon Pontie
Paolo Maistri
Régis Leveugle
Published in:
Microprocess. Microsystems (2016)
Keyphrases
</>
elliptic curve
scalar multiplication
elliptic curve cryptography
diffie hellman
key management
public key cryptography
digital signature
efficient computation
key distribution
security properties
computational complexity
ad hoc networks
temporal constraints
security policies