Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography (Q445404): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.mcm.2011.06.017 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1994462403 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536798 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic curve cryptosystems in the presence of permanent and transient faults / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4265362 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Speeding the Pollard and Elliptic Curve Methods of Factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425714 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502798 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4425683 / rank
 
Normal rank

Latest revision as of 14:01, 5 July 2024

scientific article
Language Label Description Also known as
English
Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
scientific article

    Statements

    Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography (English)
    0 references
    0 references
    0 references
    24 August 2012
    0 references
    Montgomery power ladder
    0 references
    elliptic curve cryptography
    0 references
    side-channel attack
    0 references
    countermeasure
    0 references

    Identifiers