Safe-errors on SPA protected implementations with the atomicity technique
From MaRDI portal
Publication:2803660
Recommendations
- Complete atomic blocks for elliptic curves in Jacobian coordinates over prime fields
- Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm
- Cryptographic Hardware and Embedded Systems - CHES 2004
- scientific article; zbMATH DE number 1848387
- Common points on elliptic curves: the achilles' heel of fault attack countermeasures
Cites work
- scientific article; zbMATH DE number 1302784 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 1504818 (Why is no real title available?)
- scientific article; zbMATH DE number 1759669 (Why is no real title available?)
- GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
- Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
- Lattice attacks on digital signature schemes
- Lattice-based fault attacks on signatures
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Public Key Cryptography - PKC 2005
- Solving BDD by enumeration: an update
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
Cited in
(2)
This page was built for publication: Safe-errors on SPA protected implementations with the atomicity technique
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803660)