Modular exponentiation with inner product to resist higher-order DPA attacks.
Hridoy Jyoti MahantaAjoy Kumar KhanSomnath MukhopadhyayPublished in: Innov. Syst. Softw. Eng. (2020)
Keyphrases
- modular exponentiation
- higher order
- differential power analysis
- countermeasures
- power analysis
- elliptic curve
- addition chains
- smart card
- secure communication
- public key cryptosystems
- key exchange
- information security
- digital signal processing
- public key cryptography
- digital signature
- markov random field
- diffie hellman
- security analysis
- public key
- efficient computation
- elliptic curve cryptography
- data flow
- watermarking scheme