Computing a secure elliptic curve scalar multiplication using an unsecured and secure environment
摘要:
A system includes a secure processor and an unsecure processor. The secure processor is configured to: split a secure scalar K into m2 random values ki, where i is an integer index; randomly select m1-m2 values ki for the indices m2
信息查询
0/0