On Edwards curves and ZVP-attacks
From MaRDI portal
Publication:2441444
DOI10.1007/s00200-013-0211-2zbMath1292.94111OpenAlexW2011545389MaRDI QIDQ2441444
Publication date: 24 March 2014
Published in: Applicable Algebra in Engineering, Communication and Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00200-013-0211-2
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Special algebraic curves and curves of low genus (14H45)
Related Items (2)
Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves ⋮ A formula for disaster: a unified approach to elliptic curve special-point-based attacks
Cites Work
- Unnamed Item
- To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- Twisted Edwards Curves
- Twisted Edwards Curves Revisited
- Pairing Computation on Twisted Edwards Form Elliptic Curves
- On Avoiding ZVP-Attacks Using Isogeny Volcanoes
- Elliptic Curve Cryptosystems
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- ECM using Edwards curves
- An Analysis of Goubin’s Refined Power Analysis Attack
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Inverted Edwards Coordinates
- Faster Addition and Doubling on Elliptic Curves
- A normal form for elliptic curves
- Advances in Elliptic Curve Cryptography
- Public Key Cryptography – PKC 2004
This page was built for publication: On Edwards curves and ZVP-attacks