Login / Signup
A scan-based attack on Elliptic Curve Cryptosystems in presence of industrial Design-for-Testability structures.
Jean DaRolt
Amitabh Das
Giorgio Di Natale
Marie-Lise Flottes
Bruno Rouzeyre
Ingrid Verbauwhede
Published in:
DFT (2012)
Keyphrases
</>
elliptic curve
industrial design
power analysis
scalar multiplication
key agreement
elliptic curve cryptography
diffie hellman
digital signature
efficient computation
public key cryptography
modular exponentiation
public key cryptosystems
data streams
java card
key management
countermeasures
data objects