Sign in

Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip.

Xiang WangLiping WangYuanchen BaiZhenxue HeTao WangBin XuHe ZhangXiaocui WangCheng ZhouWeike WangPei Du
Published in: UIC/ATC/ScalCom (2015)
Keyphrases
  • elliptic curve
  • elliptic curve cryptography
  • scalar multiplication
  • computational complexity
  • public key cryptosystems
  • access control
  • similarity search
  • error correction
  • encryption algorithm