Safe-errors on SPA protected implementations with the atomicity technique
From MaRDI portal
Publication:2803660
DOI10.1007/978-3-662-49301-4_30zbMATH Open1405.94062OpenAlexW2405870979MaRDI QIDQ2803660FDOQ2803660
Authors: Pierre-Alain Fouque, Sylvain Guilley, Cédric Murdica, David Naccache
Publication date: 2 May 2016
Published in: The New Codebreakers (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-49301-4_30
Recommendations
- Complete atomic blocks for elliptic curves in Jacobian coordinates over prime fields
- Two lattice-based differential fault attacks against ECDSA with \(w\)NAF algorithm
- Cryptographic Hardware and Embedded Systems - CHES 2004
- scientific article; zbMATH DE number 1848387
- Common points on elliptic curves: the achilles' heel of fault attack countermeasures
elliptic curve cryptographyfault attacksside-channel atomicityinfective countermeasurelattice attack
Cites Work
- Title not available (Why is that?)
- Hardness of computing the most significant bits of secret keys in Diffie-Hellman and related schemes
- Public Key Cryptography - PKC 2005
- Lattice attacks on digital signature schemes
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- Title not available (Why is that?)
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Title not available (Why is that?)
- Lattice-based fault attacks on signatures
- Solving BDD by enumeration: an update
- GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias
- Title not available (Why is that?)
Cited In (2)
This page was built for publication: Safe-errors on SPA protected implementations with the atomicity technique
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2803660)