An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost
From MaRDI portal
Publication:2889769
DOI10.1007/978-3-642-28368-0_18zbMath1300.94054OpenAlexW60689211MaRDI QIDQ2889769
Junfeng Fan, Ingrid Verbauwhede
Publication date: 8 June 2012
Published in: Cryptography and Security: From Theory to Applications (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2293.pdf
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (5)
Constructing locally leakage-resilient linear secret-sharing schemes ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ A novel elliptic curve scalar multiplication algorithm against power analysis ⋮ Protecting ECC against fault attacks: the ring extension method revisited ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace
This page was built for publication: An Updated Survey on Secure ECC Implementations: Attacks, Countermeasures and Cost