Protecting ECC against fault attacks: the ring extension method revisited
From MaRDI portal
Publication:2023307
DOI10.1515/jmc-2019-0030zbMath1461.14032OpenAlexW3059623528MaRDI QIDQ2023307
Publication date: 3 May 2021
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2019-0030
elliptic curvesformal groupselliptic curve cryptosystemsfault attackscountermeasuresdegenerate curves
Cryptography (94A60) Elliptic curves (14H52) Applications to coding theory and cryptography of arithmetic geometry (14G50) Reliability, testing and fault tolerance of networks and computer systems (68M15)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Fault analysis in cryptography. Foreword by Dan Boneh
- Invalid-curve attacks on (hyper)elliptic curve cryptosystems
- Information security practice and experience. Third international conference, ISPEC 2007, Hong Kong, China, May 7--9, 2007. Proceedings
- Complete systems of addition laws an abelian varieties
- Addition laws on elliptic curves in arbitrary characteristics
- Elliptic curve Paillier schemes
- Speeding up Huff form of elliptic curves
- Sequences of numbers generated by addition in formal groups and new primality and factorization tests
- Complete systems of two addition laws for elliptic curves
- Improving the arithmetic of elliptic curves in the Jacobi model
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Diophantine problems in geometry and elliptic ternary forms
- Degenerate Curve Attacks
- Complete Addition Formulas for Prime Order Elliptic Curves
- An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
- Twisted Hessian Curves
- On Randomness Extraction in Elliptic Curves
- An exploration of affine group laws for elliptic curves
- Twisted Edwards Curves
- Fast Point Multiplication on Elliptic Curves without Precomputation
- Efficient Arithmetic on Hessian Curves
- Twisted Edwards Curves Revisited
- Jacobi Quartic Curves Revisited
- Elliptic Curve Cryptosystems
- A method for obtaining digital signatures and public-key cryptosystems
- Validation of Elliptic Curve Public Keys
- Elliptic curves in Huff’s model
- Huff’s Model for Elliptic Curves
- Bit-Flip Faults on Elliptic Curve Base Fields, Revisited
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Faster Addition and Doubling on Elliptic Curves
- A normal form for elliptic curves
- Advances in Cryptology - CRYPTO 2003
- New Formulae for Efficient Elliptic Curve Arithmetic
- Advances in Elliptic Curve Cryptography
- On the importance of eliminating errors in cryptographic computations
This page was built for publication: Protecting ECC against fault attacks: the ring extension method revisited