Login / Signup

Zero-Value Point Attacks on Kummer-Based Cryptosystem.

Fangguo ZhangQiping LinShengli Liu
Published in: ACNS (2012)
Keyphrases
  • cellular automata
  • power analysis
  • countermeasures
  • data mining
  • digital images
  • computer security
  • elliptic curve