Computing a secure elliptic curve scalar multiplication using an unsecured and secure environment
Abstract:
A system includes a secure processor and an unsecure processor. The secure processor is configured to: split a secure scalar K into m2 random values ki, where i is an integer index; randomly select m1-m2 values ki for the indices m2
Information query
Patent Agency Ranking
0/0