作者: M. Michaël Adjedj
DOI:
关键词:
摘要: The method involves applying (20) invertible homomorphism (Mi) e.g. homomorphic encryption, to secret data (Di) before application (22) of cryptographic operation i.e. mathematical (Oi), where the is compatible with internal composition law. Another homomorphism, inverse applied (24) after operation. a result homomorphism. latter An independent claim also included for device protecting cryptography circuit against attacks detect utilized during execution algorithm by circuit.