Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
From MaRDI portal
Publication:2790057
DOI10.1007/978-3-319-16715-2_23zbMath1382.94118OpenAlexW1576488632MaRDI QIDQ2790057
Michael Tunstall, Heeseok Kim, Neil Hanley
Publication date: 2 March 2016
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16715-2_23
Related Items (5)
Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The distributions of individual bits in the output of multiplicative operations
- Some baby-step giant-step algorithms for the low hamming weight discrete logarithm problem
- ROSETTA for Single Trace Analysis
- An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
- Horizontal Collision Correlation Attack on Elliptic Curves
- Horizontal Correlation Analysis on Exponentiation
- Defeating RSA Multiply-Always and Message Blinding Countermeasures
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
- Exponent Recoding and Regular Exponentiation Algorithms
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- A method for obtaining digital signatures and public-key cryptosystems
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Faster Addition and Doubling on Elliptic Curves
This page was built for publication: Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace