Constant-time hardware computation of elliptic curve scalar multiplication around the 128 bit security level.
Atil U. AyCuauhtemoc Mancillas-LópezErdinç ÖztürkFrancisco Rodríguez-HenríquezErkay SavasPublished in: Microprocess. Microsystems (2018)
Keyphrases
- scalar multiplication
- elliptic curve
- security level
- efficient computation
- secret key
- secure communication
- information security
- low cost
- key management
- digital signature
- java card
- real time
- computational efficiency
- cost effective
- embedded systems
- rfid tags
- high dimensional
- secret sharing scheme
- data streams
- data mining