Sciweavers

ESAS
2005
Springer
13 years 10 months ago
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi