Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3043950

zbMath1055.94512MaRDI QIDQ3043950

Éric Brier, Marc Joye

Publication date: 9 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2274/22740335.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (27)

Formal Proof of the Group Law for Edwards Elliptic CurvesGeneric Cryptanalysis of Combined Countermeasures with Randomized BSD RepresentationsPower Analysis to ECC Using Differential Power Between Multiplication and SquaringWhite-box ECDSA: challenges and existing solutionsJacobian coordinates on genus 2 curvesHorizontal collision correlation attack on elliptic curvesTraces of the group law on the Kummer surface of a curve of genus 2 in characteristic 2A formula for disaster: a unified approach to elliptic curve special-point-based attacksDifferential fault attack on Montgomery ladder and in the presence of scalar randomizationAttacking embedded ECC implementations through CMOV side channelsFast, uniform scalar multiplication for genus 2 Jacobians with fast KummersMontgomery Ladder for All Genus 2 Curves in Characteristic 2Speeding up regular elliptic curve scalar multiplication without precomputationFault-based attack on Montgomery's ladder algorithmFaster Addition and Doubling on Elliptic CurvesArithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards ProductsExtended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysisMemory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationCompression on the Twisted Jacobi IntersectionToric forms of elliptic curves and their arithmeticTwisted Edwards Curves RevisitedExploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceUltra High-Performance ASIC Implementation of SM2 with SPA ResistanceCryptography on twisted Edwards curves over local fieldsArithmetic of the level four theta model of elliptic curvesConstructive and destructive use of compilers in elliptic curve cryptographyDistinguishing Multiplications from Squaring Operations




This page was built for publication: