Effective Algorithms to Resist power analysis attacks for ECC over prime field

碩士 === 大同大學 === 電機工程學系(所) === 101 === Elliptic curve cryptosystem (ECC) has been widely applied to many resource constraint environments due to the fact that it requires shorter keys than traditional public-key cryptosystems in equal security level. However, ECC is vulnerable to power analysis attac...

Full description

Bibliographic Details
Main Authors: Tsung-Wu Lee, 李宗武
Other Authors: Shuenn-Shyang Wang
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/13320619899620885708