scientific article
From MaRDI portal
Publication:3043950
zbMath1055.94512MaRDI QIDQ3043950
Publication date: 9 August 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2274/22740335.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (27)
Formal Proof of the Group Law for Edwards Elliptic Curves ⋮ Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations ⋮ Power Analysis to ECC Using Differential Power Between Multiplication and Squaring ⋮ White-box ECDSA: challenges and existing solutions ⋮ Jacobian coordinates on genus 2 curves ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Traces of the group law on the Kummer surface of a curve of genus 2 in characteristic 2 ⋮ A formula for disaster: a unified approach to elliptic curve special-point-based attacks ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers ⋮ Montgomery Ladder for All Genus 2 Curves in Characteristic 2 ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Fault-based attack on Montgomery's ladder algorithm ⋮ Faster Addition and Doubling on Elliptic Curves ⋮ Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products ⋮ Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis ⋮ Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation ⋮ Compression on the Twisted Jacobi Intersection ⋮ Toric forms of elliptic curves and their arithmetic ⋮ Twisted Edwards Curves Revisited ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance ⋮ Cryptography on twisted Edwards curves over local fields ⋮ Arithmetic of the level four theta model of elliptic curves ⋮ Constructive and destructive use of compilers in elliptic curve cryptography ⋮ Distinguishing Multiplications from Squaring Operations
This page was built for publication: