A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
From MaRDI portal
Publication:4414708
DOI10.1007/3-540-36288-6_15zbMath1033.94526OpenAlexW2104841597MaRDI QIDQ4414708
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_15
elliptic curvespublic-key cryptographypower analysisside-channel attackssmartcardsdifferential power analysis (DPA)
Related Items (14)
Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves ⋮ Evaluating the Cache Side Channel Attacks Against ECDSA ⋮ Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations ⋮ Power Analysis to ECC Using Differential Power Between Multiplication and Squaring ⋮ Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers ⋮ Power attacks on a side-channel resistant elliptic curve implementation ⋮ Generalised Mersenne numbers revisited ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ DiSSECT: distinguisher of standard and simulated elliptic curves via traits ⋮ A formula for disaster: a unified approach to elliptic curve special-point-based attacks ⋮ On Edwards curves and ZVP-attacks ⋮ Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman ⋮ On Avoiding ZVP-Attacks Using Isogeny Volcanoes ⋮ Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
Uses Software
Cites Work
This page was built for publication: A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems