Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves
From MaRDI portal
Publication:1616162
DOI10.1007/s11786-018-0346-4zbMath1432.94124OpenAlexW2810133984MaRDI QIDQ1616162
Valeria Mendoza, Rodrigo Abarzúa, Santi Martínez, Javier Valera
Publication date: 1 November 2018
Published in: Mathematics in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11786-018-0346-4
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On Edwards curves and ZVP-attacks
- Endomorphisms of Abelian varieties over finite fields
- There’s Something about m-ary
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- Fast algorithms for computing isogenies between elliptic curves
- On Avoiding ZVP-Attacks Using Isogeny Volcanoes
- Elliptic Curve Cryptosystems
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- An Analysis of Goubin’s Refined Power Analysis Attack
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
- Public Key Cryptography – PKC 2004