On Avoiding ZVP-Attacks Using Isogeny Volcanoes
From MaRDI portal
Publication:3605396
DOI10.1007/978-3-642-00306-6_20zbMath1292.94114OpenAlexW1586000195MaRDI QIDQ3605396
R. Tomàs, Daniel Sadornil, Magda Valls, Juan G. Tena Ayuso, Josep M. Miret Biosca
Publication date: 24 February 2009
Published in: Information Security Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00306-6_20
Related Items
Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves ⋮ Computing isogeny volcanoes of composite degree ⋮ On Edwards curves and ZVP-attacks
Uses Software
Cites Work
- Computing the height of volcanoes of \(\ell \)-isogenies of elliptic curves over finite fields
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- An Analysis of Goubin’s Refined Power Analysis Attack
- Computing Modular Polynomials
- Public Key Cryptography – PKC 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item