An updated survey on secure ECC implementations: attacks, countermeasures and cost
DOI10.1007/978-3-642-28368-0_18zbMATH Open1300.94054OpenAlexW60689211MaRDI QIDQ2889769FDOQ2889769
Authors: Junfeng Fan, Ingrid Verbauwhede
Publication date: 8 June 2012
Published in: Cryptography and Security: From Theory to Applications (Search for Journal in Brave)
Full work available at URL: https://www.cosic.esat.kuleuven.be/publications/article-2293.pdf
Recommendations
- scientific article; zbMATH DE number 1979278
- scientific article; zbMATH DE number 1878343
- Implementation of cryptographic algorithms for elliptic curves
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cited In (7)
- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
- Constructing locally leakage-resilient linear secret-sharing schemes
- Protecting ECC against fault attacks: the ring extension method revisited
- A novel elliptic curve scalar multiplication algorithm against power analysis
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- Title not available (Why is that?)
This page was built for publication: An updated survey on secure ECC implementations: attacks, countermeasures and cost
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889769)