Horizontal collision correlation attack on elliptic curves
From MaRDI portal
Publication:892284
DOI10.1007/s12095-014-0111-8zbMath1365.94400OpenAlexW2111978877MaRDI QIDQ892284
Emmanuel Prouff, Aurélie Bauer, Jean-René Reinhard, Eliane Jaulmes, Justine Wild
Publication date: 18 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0111-8
Related Items (4)
Digital signature with elliptic curves over the finite fields ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Thwarting side-channel analysis against RSA cryptosystems with additive blinding
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Mutual information analysis: a comprehensive study
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- ROSETTA for Single Trace Analysis
- Statistical Tools Flavor Side-Channel Collision Attacks
- Horizontal Collision Correlation Attack on Elliptic Curves
- Horizontal Correlation Analysis on Exponentiation
- Modular Multiplication Without Trial Division
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Highly Regular Right-to-Left Algorithms for Scalar Multiplication
- Correlation-Enhanced Power Analysis Collision Attack
- Coordinate Blinding over Large Prime Fields
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Elliptic Curve Cryptosystems
- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations
- Statistical Analysis of Second Order Differential Power Analysis
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Faster Addition and Doubling on Elliptic Curves
- A normal form for elliptic curves
- Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
- A SIGNED BINARY MULTIPLICATION TECHNIQUE
- Theory of Cryptography
- Fast Software Encryption
This page was built for publication: Horizontal collision correlation attack on elliptic curves