Random Order m-ary Exponentiation
From MaRDI portal
Publication:3634511
DOI10.1007/978-3-642-02620-1_30zbMath1284.94119OpenAlexW1556718570MaRDI QIDQ3634511
Publication date: 25 June 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02620-1_30
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Distinguishing Multiplications from Squaring Operations
- On the Evaluation of Powers
- A method for obtaining digital signatures and public-key cryptosystems
- Towards sound approaches to counteract power-analysis attacks
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Applied Cryptography and Network Security
This page was built for publication: Random Order m-ary Exponentiation