Login / Signup

Secure Elliptic Curve Implementations: An Analysis of Resistance to Power-Attacks in a DSP Processor.

Catherine H. GebotysRobert J. Gebotys
Published in: CHES (2002)
Keyphrases
  • elliptic curve
  • power consumption
  • digital signature
  • key management