On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards.
Ahmad BoorghanySiavash Bayat SarmadiRasool JaliliPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- smart card
- digital signature
- information security
- security analysis
- security requirements
- java card
- authentication scheme
- secret key
- differential power analysis
- power analysis
- high level
- secure communication
- authentication protocol
- efficient implementation
- remote user authentication scheme
- information systems
- packet filtering
- elliptic curve
- security mechanisms