An updated survey on secure ECC implementations: attacks, countermeasures and cost
From MaRDI portal
Publication:2889769
Recommendations
- scientific article; zbMATH DE number 1979278
- scientific article; zbMATH DE number 1878343
- Implementation of cryptographic algorithms for elliptic curves
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Cited in
(7)- Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
- Constructing locally leakage-resilient linear secret-sharing schemes
- Protecting ECC against fault attacks: the ring extension method revisited
- A novel elliptic curve scalar multiplication algorithm against power analysis
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
- Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
- scientific article; zbMATH DE number 1878344 (Why is no real title available?)
This page was built for publication: An updated survey on secure ECC implementations: attacks, countermeasures and cost
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2889769)