Login / Signup
Invalid-curve attacks on (hyper)elliptic curve cryptosystems.
Koray Karabina
Berkant Ustaoglu
Published in:
Adv. Math. Commun. (2010)
Keyphrases
</>
elliptic curve
java card
power analysis
scalar multiplication
elliptic curve cryptography
digital signature
diffie hellman
key management
countermeasures
efficient computation
public key cryptosystems
watermarking scheme
public key cryptography
watermarking algorithm
security mechanisms