Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Algorithm 1

GF multiplication of mod by adding times.
Requires: ,
   ,
  
Ensure:
(1)
(2) for   to 0 do
(3)    
(4)    
(5)    
(6)    
(7) end for
(8) return