Attacking embedded ECC implementations through CMOV side channels (Q1698620): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Online Template Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlation Analysis against Protected SFM Implementations of RSA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal collision correlation attack on elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking Exponent Blinding in RSA without CRT / rank
 
Normal rank
Property / cites work
 
Property / cites work: “Ooh Aah... Just a Little Bit” : A Small Amount of Side Channel Can Go a Long Way / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Hardware and Embedded Systems - CHES 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3043950 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Memory Address Side-Channel Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: ROSETTA for Single Trace Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Correlation Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Doubling Attack – Why Upwards Is Better than Downwards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solving Discrete Logarithms from Partial Knowledge of the Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace / rank
 
Normal rank
Property / cites work
 
Property / cites work: Localized Electromagnetic Analysis of Cryptographic Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Comparative Power Analysis of Modular Exponentiation Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: NaCl on 8-Bit AVR Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425693 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Practical Countermeasure against Address-Bit Differential Power Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Speeding the Pollard and Elliptic Curve Methods of Factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking embedded ECC implementations through CMOV side channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS / rank
 
Normal rank
Property / cites work
 
Property / cites work: ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797790 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking Randomized Exponentiations Using Unsupervised Learning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797390 / rank
 
Normal rank
Property / cites work
 
Property / cites work: 8/16/32 Shades of Elliptic Curve Cryptography on Embedded Processors / rank
 
Normal rank

Latest revision as of 03:37, 15 July 2024

scientific article
Language Label Description Also known as
English
Attacking embedded ECC implementations through CMOV side channels
scientific article

    Statements

    Attacking embedded ECC implementations through CMOV side channels (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    16 February 2018
    0 references
    ECC
    0 references
    Montgomery ladder
    0 references
    power analysis
    0 references
    AVR
    0 references
    conditional move
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers