Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity - MaRDI portal

Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity

From MaRDI portal
Publication:3417024

DOI10.1109/TC.2004.13zbMath1300.94045MaRDI QIDQ3417024

Marc Joye, Mathieu Ciet, Benoît Chevallier-Mames

Publication date: 9 January 2007

Published in: IEEE Transactions on Computers (Search for Journal in Brave)




Related Items (23)

Generic Cryptanalysis of Combined Countermeasures with Randomized BSD RepresentationsFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4Efficient elliptic curve scalar multiplication algorithms resistant to power analysisAn Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic TransformHorizontal collision correlation attack on elliptic curvesFirst-order side channel attacks on Zhang's countermeasuresFast Point Multiplication on Elliptic Curves without PrecomputationSpeeding up regular elliptic curve scalar multiplication without precomputationFaster Addition and Doubling on Elliptic CurvesExtended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysisExploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceThe double-base number system and its application to elliptic curve cryptographyOn the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel ResistanceImproving the Big Mac Attack on Elliptic Curve CryptographySafe-Errors on SPA Protected Implementations with the Atomicity TechniqueA secure exponentiation algorithm resistant to a combined attack on RSA implementationSecuring RSA against Fault Analysis by Double Addition Chain ExponentiationConstructive and destructive use of compilers in elliptic curve cryptographyDouble-base chains for scalar multiplications on elliptic curvesRandom Order m-ary ExponentiationExponent Recoding and Regular Exponentiation AlgorithmsDistinguishing Multiplications from Squaring OperationsSquare Always Exponentiation




This page was built for publication: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity