Improving the Big Mac Attack on Elliptic Curve Cryptography (Q2803645): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Formal techniques for distributed systems. Joint IFIP WG 6.1 international conference, FMOODS/FORTE 2013, held as part of the 8th international federated conference on distributed computing techniques, DisCo Tec 2013, Florence, Italy, June 3--5, 2013. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Collision Correlation Attack on Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: ROSETTA for Single Trace Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Horizontal Correlation Analysis on Exponentiation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249254 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4502796 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797391 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Point Multiplication on Elliptic Curves without Precomputation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797813 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modular Multiplication Without Trial Division / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797390 / rank
 
Normal rank

Latest revision as of 22:29, 11 July 2024

scientific article
Language Label Description Also known as
English
Improving the Big Mac Attack on Elliptic Curve Cryptography
scientific article

    Statements

    Improving the Big Mac Attack on Elliptic Curve Cryptography (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    2 May 2016
    0 references
    0 references
    elliptic curve cryptography
    0 references
    side-channel attack
    0 references
    Big Mac attack
    0 references
    side-channel atomicity
    0 references
    0 references