Login / Signup
Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems.
Roberto Maria Avanzi
Simon Hoerder
Daniel Page
Michael Tunstall
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
public key cryptosystems
modular exponentiation
smart card
secure communication
elliptic curve
wireless sensor networks
key distribution
elliptic curve cryptography
encryption scheme
key management
key exchange
digital signature
digital signal processing