Login / Signup
Zero-Value Point Attacks on Kummer-Based Cryptosystem.
Fangguo Zhang
Qiping Lin
Shengli Liu
Published in:
ACNS (2012)
Keyphrases
</>
cellular automata
power analysis
countermeasures
data mining
digital images
computer security
elliptic curve