Login / Signup
Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling.
Dongjun Park
Minsig Choi
GyuSang Kim
Daehyeon Bae
Heeseok Kim
Seokhie Hong
Published in:
IEEE Access (2023)
Keyphrases
</>
scalar multiplication
elliptic curve
power analysis
key agreement
secret key
secure communication
key management
smart card
efficient computation
diffie hellman
real time
digital signature
countermeasures
public key
key distribution
hash functions
encryption scheme
authentication scheme