Cargando…
Fast Constant-Time Modular Inversion over [Formula: see text] Resistant to Simple Power Analysis Attacks for IoT Applications
The advent of the Internet of Things (IoT) has enabled millions of potential new uses for consumers and businesses. However, with these new uses emerge some of the more pronounced risks in the connected object domain. Finite fields play a crucial role in many public-key cryptographic algorithms (PKC...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9002486/ https://www.ncbi.nlm.nih.gov/pubmed/35408148 http://dx.doi.org/10.3390/s22072535 |