scientific article; zbMATH DE number 1878343
From MaRDI portal
Publication:4797813
zbMath1012.94550MaRDI QIDQ4797813
Publication date: 9 March 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2162/21620377.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
elliptic curvespublic-key cryptographyside-channel attackstiming attacksdifferential power analysis (DPA)smart-cards
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (14)
An efficient method against side-channel attacks on ECC ⋮ Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations ⋮ Power Analysis to ECC Using Differential Power Between Multiplication and Squaring ⋮ White-box ECDSA: challenges and existing solutions ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ A metric on the set of elliptic curves over \(\mathbb{F}_p\) ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ Horizontal collision correlation attack on elliptic curves ⋮ Recovering secrets from prefix-dependent leakage ⋮ Metrics on the sets of nonsupersingular elliptic curves in simplified Weierstrass form over finite fields of characteristic two ⋮ The double-base number system and its application to elliptic curve cryptography ⋮ On Avoiding ZVP-Attacks Using Isogeny Volcanoes ⋮ Improving the Big Mac Attack on Elliptic Curve Cryptography ⋮ Construction of metrics on the set of elliptic curves over a finite field
This page was built for publication: