Analysis of the fault attack ECDLP over prime field (Q410803): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claims
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / author
 
Property / author: Ming-Qiang Wang / rank
 
Normal rank
Property / author
 
Property / author: Zhan, Tao / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2011/580749 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2069132213 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the importance of eliminating errors in cryptographic computations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536798 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curve Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3718617 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Die Typen der Multiplikatorenringe elliptischer Funktionenkörper / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: How the Number of Points of An Elliptic Curve Over a Fixed Prime Field Varies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonsingular plane cubic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Abelian varieties over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Factoring integers with elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: A hyperelliptic smoothness test. I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p / rank
 
Normal rank
Property / cites work
 
Property / cites work: On a problem of Oppenheim concerning ''Factorisatio Numerorum'' / rank
 
Normal rank

Latest revision as of 01:49, 5 July 2024

scientific article
Language Label Description Also known as
English
Analysis of the fault attack ECDLP over prime field
scientific article

    Statements

    Analysis of the fault attack ECDLP over prime field (English)
    0 references
    0 references
    4 April 2012
    0 references
    Summary: \textit{I. Biehl} et al. [Crypto 2000, Lect. Notes Comput. Sci. 1880, 131--146 (2000; Zbl 0989.94505)] proposed a fault-based attack on elliptic curve cryptography. In this paper, we refined the fault attack method. An elliptic curve \(E\) is defined over prime field \(\mathbb F_p\) with base point \(P \in E(\mathbb F_p)\). Applying the fault attack on these curves, the discrete logarithm on the curve can be computed in subexponential time of \(L_p(1/2, 1 + o(1))\). The runtime bound relies on heuristics conjecture about smooth numbers similar to the ones used by \textit{H. W. Lenstra jun.} [Ann. Math. (2) 126, 649--673 (1987; Zbl 0629.10006)].
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references