Login / Signup

An efficiently secure ECC scalar multiplication method against Power Analysis Attacks on resource constrained devices.

Hilal HoussainTurki F. Al-Somani
Published in: ICCIT (2013)
Keyphrases
  • power analysis
  • resource constrained
  • scalar multiplication
  • elliptic curve
  • security mechanisms
  • information systems
  • countermeasures
  • lightweight
  • control method