Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography.
Kun JiangBing ZhaoWeijun ShanLihui WangJing LiuPublished in: CIS (2016)
Keyphrases
- elliptic curve cryptography
- digital watermark
- public key cryptosystems
- public key
- secret key
- elliptic curve
- authentication scheme
- security analysis
- encryption algorithm
- modular exponentiation
- jpeg compression
- copyright protection
- digital watermarking
- authentication protocol
- high security
- image watermarking
- wireless sensor networks
- image processing operations
- public key cryptography
- error correction
- watermarking scheme
- key distribution
- access control
- digital images