[IEEE 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence...

  • Main
  • [IEEE 2015 IEEE 12th Intl Conf on...

[IEEE 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) - Beijing, China (2015.8.10-2015.8.14)] 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom) - Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip

Wang, Xiang, Wang, Liping, Bai, Yuanchen, He, Zhenxue, Wang, Tao, Xu, Bin, Zhang, He, Wang, Xiaocui, Zhou, Cheng, Wang, Weike, Du, Pei
How much do you like this book?
What’s the quality of the file?
Download the book for quality assessment
What’s the quality of the downloaded files?
Year:
2015
DOI:
10.1109/uic-atc-scalcom-cbdcom-iop.2015.252
File:
PDF, 652 KB
2015
Conversion to is in progress
Conversion to is failed