Publication:3043950

From MaRDI portal


zbMath1055.94512MaRDI QIDQ3043950

Éric Brier, Marc Joye

Publication date: 9 August 2004

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2274/22740335.htm



Related Items

Formal Proof of the Group Law for Edwards Elliptic Curves, Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations, Power Analysis to ECC Using Differential Power Between Multiplication and Squaring, White-box ECDSA: challenges and existing solutions, Jacobian coordinates on genus 2 curves, Horizontal collision correlation attack on elliptic curves, Traces of the group law on the Kummer surface of a curve of genus 2 in characteristic 2, A formula for disaster: a unified approach to elliptic curve special-point-based attacks, Differential fault attack on Montgomery ladder and in the presence of scalar randomization, Attacking embedded ECC implementations through CMOV side channels, Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers, Montgomery Ladder for All Genus 2 Curves in Characteristic 2, Speeding up regular elliptic curve scalar multiplication without precomputation, Fault-based attack on Montgomery's ladder algorithm, Faster Addition and Doubling on Elliptic Curves, Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products, Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis, Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation, Compression on the Twisted Jacobi Intersection, Toric forms of elliptic curves and their arithmetic, Twisted Edwards Curves Revisited, Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace, Ultra High-Performance ASIC Implementation of SM2 with SPA Resistance, Cryptography on twisted Edwards curves over local fields, Arithmetic of the level four theta model of elliptic curves, Constructive and destructive use of compilers in elliptic curve cryptography, Distinguishing Multiplications from Squaring Operations