Login / Signup
An efficiently secure ECC scalar multiplication method against Power Analysis Attacks on resource constrained devices.
Hilal Houssain
Turki F. Al-Somani
Published in:
ICCIT (2013)
Keyphrases
</>
power analysis
resource constrained
scalar multiplication
elliptic curve
security mechanisms
information systems
countermeasures
lightweight
control method