On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 4 users not shown)
Property / author
 
Property / author: Q1961638 / rank
Normal rank
 
Property / author
 
Property / author: François-Xavier Standaert / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_9 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3107238311 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal side-channel attacks and countermeasures on the ISW masking scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Collision Correlation Attack on Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Correlation Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797391 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Masking proofs are tight and how to exploit it in security evaluations / rank
 
Normal rank
Property / cites work
 
Property / cites work: ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace / rank
 
Normal rank
Property / cites work
 
Property / cites work: NaCl on 8-Bit AVR Microcontrollers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5008178 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modular Multiplication Without Trial Division / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Evaluations beyond Computing Power / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soft Analytical Side-Channel Attacks / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 13:16, 29 July 2024

scientific article
Language Label Description Also known as
English
On the worst-case side-channel security of ECC point randomization in embedded devices
scientific article

    Statements

    On the worst-case side-channel security of ECC point randomization in embedded devices (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    6 July 2022
    0 references
    side-channel analysis
    0 references
    elliptic curve cryptography
    0 references
    point randomization
    0 references
    belief propagation
    0 references
    single-trace attacks
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers