Elliptic curve cryptosystems in the presence of permanent and transient faults
From MaRDI portal
Publication:2486874
Recommendations
- Fault attacks on elliptic curve cryptosystems
- scientific article; zbMATH DE number 1759775
- On countermeasures against fault attacks on elliptic curve cryptography using fault detection
- Elliptic Curve Cryptosystems
- Bit-flip faults on elliptic curve base fields, revisited
- Secure and compact elliptic curve cryptosystems
- Secure elliptic curves and their performance
- Elliptic curve cryptosystems and their implementation
- Efficient elliptic curve cryptosystems
- Elliptic and hyperelliptic curves: a practical security analysis
Cites work
- scientific article; zbMATH DE number 1617935 (Why is no real title available?)
- scientific article; zbMATH DE number 1722669 (Why is no real title available?)
- scientific article; zbMATH DE number 438988 (Why is no real title available?)
- scientific article; zbMATH DE number 1186947 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 1149907 (Why is no real title available?)
- scientific article; zbMATH DE number 1182512 (Why is no real title available?)
- scientific article; zbMATH DE number 2009968 (Why is no real title available?)
- scientific article; zbMATH DE number 1759775 (Why is no real title available?)
- scientific article; zbMATH DE number 2086697 (Why is no real title available?)
- scientific article; zbMATH DE number 1857527 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Constructive and destructive facets of Weil descent on elliptic curves
- Kangaroos, monopoly and discrete logarithms
- On the importance of eliminating errors in cryptographic computations
- Reducing elliptic curve logarithms to logarithms in a finite field
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(22)- Fault attacks on elliptic curve cryptosystems
- Validation of Elliptic Curve Public Keys
- scientific article; zbMATH DE number 1759775 (Why is no real title available?)
- Analysis of the fault attack ECDLP over prime field
- Common points on elliptic curves: the achilles' heel of fault attack countermeasures
- Towards practical key exchange from ordinary isogeny graphs
- Differential fault analysis of AES: toward reducing number of faults
- Quantum lattice enumeration and tweaking discrete pruning
- Protecting ECC against fault attacks: the ring extension method revisited
- Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography
- Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
- Montgomery Residue Representation Fault-Tolerant Computation in GF(2 k )
- On the Security of Supersingular Isogeny Cryptosystems
- Fault attacks on hyperelliptic curve discrete logarithm problem over binary field
- All shall FA-LLL: breaking CT-RSA 2022 and CHES 2022 infective countermeasures with lattice-based fault attacks
- Horizontal collision correlation attack on elliptic curves
- Bit-flip faults on elliptic curve base fields, revisited
- Fault-based attack on Montgomery's ladder algorithm
- Practical realisation and elimination of an ECC-related software bug attack
- General Fault Attacks on Multivariate Public Key Cryptosystems
- Lattice-based fault attacks against ECMQV
- Fault Attacks on Public Key Elements: Application to DLP-Based Schemes
This page was built for publication: Elliptic curve cryptosystems in the presence of permanent and transient faults
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2486874)