Scalar recoding and regular 2w-ary right-to-left EC scalar multiplication algorithm
Keywords: رمزنگاری منحنی بیضوی; Cryptography; Simple power attack; Elliptic curve cryptosystem; Scalar recoding; Differential power attack; Countermeasure;