To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
From MaRDI portal
Publication:3172971
DOI10.1007/978-3-642-23951-9_10zbMATH Open1321.94056OpenAlexW2100220590MaRDI QIDQ3172971FDOQ3172971
Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren
Publication date: 7 October 2011
Published in: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_10
Cited In (6)
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks
- Lattice-Based Fault Attacks Against ECMQV
- On Edwards curves and ZVP-attacks
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- Combined Attack on CRT-RSA
Recommendations
- On the worst-case side-channel security of ECC point randomization in embedded devices π π
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks π π
- An efficient method against side-channel attacks on ECC π π
- Common Points on Elliptic Curves: The Achillesβ Heel of Fault Attack Countermeasures π π
- Title not available (Why is that?) π π
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem π π
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks π π
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems π π
This page was built for publication: To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172971)