Practical Realisation and Elimination of an ECC-Related Software Bug Attack
From MaRDI portal
Publication:2890003
DOI10.1007/978-3-642-27954-6_11zbMath1292.94040OpenAlexW1558518955MaRDI QIDQ2890003
Billy Bob Brumley, Frederik Vercauteren, Manuel Barbosa, Dan Page
Publication date: 8 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: http://hdl.handle.net/1822/15593
Uses Software
Cites Work
- Unnamed Item
- Constructive and destructive use of compilers in elliptic curve cryptography
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Simplify: a theorem prover for program checking
- Cryptography in Theory and Practice: The Case of Encryption in IPsec
- Bug Attacks
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Validation of Elliptic Curve Public Keys
- Advances in Cryptology - EUROCRYPT 2004
- An axiomatic basis for computer programming