Improving the Big Mac attack on elliptic curve cryptography
From MaRDI portal
Publication:2803645
DOI10.1007/978-3-662-49301-4_23zbMATH Open1405.94056OpenAlexW2404669520MaRDI QIDQ2803645FDOQ2803645
Sylvain Guilley, Jean-Luc Danger, Philippe Hoogvorst, David Naccache, Cédric Murdica
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_23
Recommendations
Cites Work
- Formal techniques for distributed systems. Joint IFIP WG 6.1 international conference, FMOODS/FORTE 2013, held as part of the 8th international federated conference on distributed computing techniques, DisCo Tec 2013, Florence, Italy, June 3--5, 2013. Proceedings
- Modular Multiplication Without Trial Division
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Information and Communications Security
- Title not available (Why is that?)
- ROSETTA for Single Trace Analysis
- Horizontal Correlation Analysis on Exponentiation
- Title not available (Why is that?)
- Horizontal Collision Correlation Attack on Elliptic Curves
- Fast Point Multiplication on Elliptic Curves without Precomputation
Cited In (2)
This page was built for publication: Improving the Big Mac attack on elliptic curve cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803645)