To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
From MaRDI portal
Publication:3172971
DOI10.1007/978-3-642-23951-9_10zbMATH Open1321.94056OpenAlexW2100220590MaRDI QIDQ3172971FDOQ3172971
Authors: Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren
Publication date: 7 October 2011
Published in: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_10
Recommendations
- On the worst-case side-channel security of ECC point randomization in embedded devices
- A systematic approach to the side-channel analysis of ECC implementations with worst-case horizontal attacks
- An efficient method against side-channel attacks on ECC
- Common points on elliptic curves: the achilles' heel of fault attack countermeasures
- scientific article; zbMATH DE number 2044541
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
Cited In (6)
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks
- Lattice-Based Fault Attacks Against ECMQV
- Combined attack on CRT-RSA. Why public verification must not be public?
- On Edwards curves and ZVP-attacks
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
This page was built for publication: To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172971)