Information and Communications Security
From MaRDI portal
Publication:3407793
DOI10.1007/b13930zbMath1300.94047OpenAlexW4210434599MaRDI QIDQ3407793
Publication date: 23 February 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b13930
randomizationelliptic curve cryptographyside-channel analysisimplementation attackselliptic curve modelspoint multiplication algorithms
Related Items (8)
Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks ⋮ Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ A novel elliptic curve scalar multiplication algorithm against power analysis ⋮ Improving the Big Mac Attack on Elliptic Curve Cryptography
This page was built for publication: Information and Communications Security