Review Article

A Security Scheme for Dependable Key Insertion in Mobile Embedded Devices

Figure 5

Sequential multiplier.
820454.fig.005