-
1Conference
المؤلفون: Ciet, M., Joye, M., 5th International Conference on Information and Communications Security
المساهمون: UCL - Autre
المصدر: Lecture Notes in Computer Science, Vol. 2836, p. 348-359 (2003)
مصطلحات موضوعية: Randomization, Elliptic Curve Cryptography, Implementation Attacks, Side-channel Analysis, Elliptic Curve Models, Point Multiplication Algorithms
Relation: boreal:61381; http://hdl.handle.net/2078.1/61381; urn:ISSN:0302-9743; urn:EISSN:1611-3349
-
2Electronic Resource
المؤلفون: UCL - Autre, Ciet, M., Joye, M., 5th International Conference on Information and Communications Security
المصدر: Lecture Notes in Computer Science, Vol. 2836, p. 348-359 (2003)