Safe-Errors on SPA Protected Implementations with the Atomicity Technique
From MaRDI portal
Publication:2803660
DOI10.1007/978-3-662-49301-4_30zbMath1405.94062OpenAlexW2405870979MaRDI QIDQ2803660
David Naccache, Cédric Murdica, Sylvain Guilley, Pierre-Alain Fouque
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_30
lattice attackelliptic curve cryptographyfault attacksside-channel atomicityinfective countermeasure
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- Lattice-Based Fault Attacks on Signatures
- GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- Solving BDD by Enumeration: An Update
- Public Key Cryptography - PKC 2005
- Lattice attacks on digital signature schemes