Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Horizontal Correlation Analysis on Exponentiation - MaRDI portal

Horizontal Correlation Analysis on Exponentiation

From MaRDI portal
Publication:3063954

DOI10.1007/978-3-642-17650-0_5zbMath1295.94040OpenAlexW2127059139MaRDI QIDQ3063954

Georges Gagnerot, Christophe Clavier, Benoit Feix, Vincent Verneuil, Mylène Roussellet

Publication date: 17 December 2010

Published in: Information and Communications Security (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-17650-0_5




Related Items (23)

Key Bit-Dependent Attack on Protected PKC Using a Single TraceGeneralizing statistical ineffective fault attacks in the spirit of side-channel attacksFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4On the worst-case side-channel security of ECC point randomization in embedded devicesTrade-Off Approaches for Leak Resistant Modular Arithmetic in RNSSecure GCM implementation on AVRHigh-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollersThe distributions of individual bits in the output of multiplicative operationsHorizontal collision correlation attack on elliptic curvesComplete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacksT_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace AttacksRoadmap of post-quantum cryptography standardization: side-channel attacks and countermeasuresCombined fault and leakage resilience: composability, constructions and compilerA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingAttacking embedded ECC implementations through CMOV side channelsSpeeding up regular elliptic curve scalar multiplication without precomputationMethods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA AttacksStatistical properties of side-channel and fault injection attacks using coding theoryMultivariate high-order attacks of shuffled tables recomputationExploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceOn the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel ResistanceImproving the Big Mac Attack on Elliptic Curve CryptographyThwarting side-channel analysis against RSA cryptosystems with additive blinding







This page was built for publication: Horizontal Correlation Analysis on Exponentiation