Highly Influential
Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asymétrique, algorithmes et implantations. (Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations)
@inproceedings{Robert2015ContrerLS, title={Contrer l'attaque Simple Power Analysis efficacement dans les applications de la cryptographie asym{\'e}trique, algorithmes et implantations. (Thwart simple power analysis efficiently in asymmetric cryptographic applications, algorithms and implementations)}, author={Jean-Marc Robert}, year={2015} }
- Published 2015
The development of online communications and the Internet have made encrypted data exchange fast growing. This has been possible with the development of asymmetric cryptographic protocols, which make use of arithmetic computations such as modular exponentiation of large integer or elliptic curve scalar multiplication. These computations are performed by various platforms, including smart-cards as well as large and powerful servers. The platforms are subjects to attacks taking advantage of… CONTINUE READING
From This Paper
Topics from this paper.
References
Publications referenced by this paper.
Showing 1-10 of 56 references
Highly Influential
Highly Influential
Highly Influential
Highly Influential
Highly Influential
Highly Influential
Highly Influential
Highly Influential
Highly Influential