Sciweavers

ESAS
2005
Springer
14 years 2 months ago
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi