Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation.
Christoph HerbstMarcel MedwedPublished in: WISA (2008)
Keyphrases
- public key cryptosystems
- modular exponentiation
- secure communication
- addition chains
- secret key
- elliptic curve
- key exchange
- digital signal processing
- key distribution
- smart card
- elliptic curve cryptography
- digital watermark
- wireless sensor networks
- efficient implementation
- encryption scheme
- authentication protocol
- signal processing
- key management