Login / Signup
Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls.
Sarani Bhattacharya
Clémentine Maurice
Shivam Bhasin
Debdeep Mukhopadhyay
Published in:
IACR Cryptol. ePrint Arch. (2017)
Keyphrases
</>
scalar multiplication
elliptic curve
secure communication
wireless networks
secret key