Cryptology ePrint Archive: Report 2012/723

Available versions in chronological order


Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks
Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis


[ Cryptology ePrint archive ]