Cargando…

Fast Constant-Time Modular Inversion over [Formula: see text] Resistant to Simple Power Analysis Attacks for IoT Applications

The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the connected object domain. Finite fields play a crucial role in many public-key cryptographic algorithms (PKC...

Descripción completa

Detalles Bibliográficos
Autores principales: Sghaier, Anissa, Zeghid, Medien, Massoud, Chiraz, Ahmed, Hassan Yousif, Chehri, Abdellah, Machhout, Mohsen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9002486/
https://www.ncbi.nlm.nih.gov/pubmed/35408148
http://dx.doi.org/10.3390/s22072535