Login / Signup
An attack on disguised elliptic curves.
David J. Mireles Morales
Published in:
J. Math. Cryptol. (2008)
Keyphrases
</>
elliptic curve
power analysis
countermeasures
scalar multiplication
smart card
digital signature
diffie hellman
elliptic curve cryptography
key management
efficient computation
secret key
java card
public key cryptography
modular exponentiation
authentication protocol
key distribution
response time