Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2006.12.016 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2052012720 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero-Value Point Attacks on Elliptic Curve Cryptosystem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797391 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Doubling Attack – Why Upwards Is Better than Downwards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043945 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425693 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797813 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3718617 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4448412 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Analysis of Goubin’s Refined Power Analysis Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of tripartite and multi-party authenticated key agreement protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulatability and security of certificateless threshold signatures / rank
 
Normal rank

Latest revision as of 18:35, 25 June 2024

scientific article
Language Label Description Also known as
English
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
scientific article

    Statements

    Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (English)
    0 references
    0 references
    18 May 2007
    0 references
    cryptography
    0 references
    elliptic curve cryptosystems
    0 references
    scalar multiplication
    0 references
    power analysis
    0 references
    highest-weight binary form
    0 references

    Identifiers