Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks.
T. SudhakarV. NatarajanA. KannathalPublished in: ICIA (2016)
Keyphrases
- elliptic curve
- power analysis
- scalar multiplication
- diffie hellman
- differential power analysis
- key management
- digital signature
- key distribution
- efficient computation
- provably secure
- countermeasures
- security properties
- secure communication
- security protocols
- block cipher
- lightweight
- security mechanisms
- smart card
- access control
- low cost
- wireless sensor networks