- Feature Paper
- Article
Securing Elliptic Curve Cryptography with Random Permutation of Secret Key
- Fayez Gebali and
- Alshimaa Magdy
Scalar multiplication is the basis of the widespread elliptic curve public key cryptography. Standard scalar multiplication is vulnerable to side-channel attacks that are able to infer the secret bit values by observing the power or delay traces. Thi...