The following pages link to (Q4425714):
Displaying 24 items.
- Memory-saving computation of the pairing final exponentiation on BN curves (Q285907) (← links)
- New fault attacks using Jacobi symbol and application to regular right-to-left algorithms (Q407590) (← links)
- Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography (Q445404) (← links)
- Fault-based attack on Montgomery's ladder algorithm (Q656523) (← links)
- Thwarting side-channel analysis against RSA cryptosystems with additive blinding (Q778376) (← links)
- Curve448 on 32-bit ARM Cortex-M4 (Q831642) (← links)
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis (Q881859) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Lattice attacks against elliptic-curve signatures with blinded scalar multiplication (Q1698621) (← links)
- On the worst-case side-channel security of ECC point randomization in embedded devices (Q2152029) (← links)
- Safe-error attacks on SIKE and CSIDH (Q2154061) (← links)
- Speeding up regular elliptic curve scalar multiplication without precomputation (Q2210646) (← links)
- Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace (Q2790057) (← links)
- On the Use of RSA Public Exponent to Improve Implementation Efficiency and Side-Channel Resistance (Q2794567) (← links)
- Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products (Q3005593) (← links)
- Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation (Q3011912) (← links)
- Square Always Exponentiation (Q3104721) (← links)
- Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS (Q3194592) (← links)
- Twisted Edwards Curves Revisited (Q3600383) (← links)
- Combined Attack on CRT-RSA (Q4916010) (← links)
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace (Q5056016) (← links)
- Faster Addition and Doubling on Elliptic Curves (Q5387091) (← links)
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks (Q6108624) (← links)
- A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding (Q6175989) (← links)