Electromagnetic Analysis Attack on an FPGA Implementation of an Elliptic Curve Cryptosystem

Author(s):  
E. De Mulder ◽  
P. Buysschaert ◽  
S.B. Ors ◽  
P. Delmotte ◽  
B. Preneel ◽  
...  
2011 ◽  
Vol 130-134 ◽  
pp. 291-294
Author(s):  
Guang Liang Liu ◽  
Sheng Xian Xie ◽  
Wei Fu

On the elliptic curve cryptosystem proposed a new multi-proxy signature scheme - (t, k, n) threshold blind proxy signature scheme.In new program blind proxy signature and (t,k,n) threshold secret sharing scheme will be combined, and will not over-concentration of the rights of the blind proxy signer .Computation of the program is small, security is high, the achieve efficiency and the utility is better .can prevent a malicious user's forgery attack and have the security properties of proxy signature.


Sign in / Sign up

Export Citation Format

Share Document