Invalid curve attacks in a GLS setting
From MaRDI portal
Recommendations
- Invalid-curve attacks on (hyper)elliptic curve cryptosystems
- Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models
- Practical invalid curve attacks on TLS-ECDH
- Attacking a binary GLS elliptic curve with Magma
- Models of curves from GHS attack in odd characteristic
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- An attack on disguised elliptic curves
- Exceptional Procedure Attack on Elliptic Curve Cryptosystems
- Fault attacks on elliptic curve cryptosystems
- Distinguishing error of nonlinear invariant attacks
Cited in
(7)- Models of curves from GHS attack in odd characteristic
- Degenerate curve attacks. Extending invalid curve attacks to Edwards curves and other models
- Invalid-curve attacks on (hyper)elliptic curve cryptosystems
- Randomized half-ideal cipher on groups with applications to UC (a)PAKE
- KHAPE: Asymmetric PAKE from key-hiding key exchange
- Asymmetric PAKE with low computation \textit{and} communication
- Practical invalid curve attacks on TLS-ECDH
This page was built for publication: Invalid curve attacks in a GLS setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1800571)