To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
From MaRDI portal
Publication:3172971
DOI10.1007/978-3-642-23951-9_10zbMATH Open1321.94056OpenAlexW2100220590MaRDI QIDQ3172971FDOQ3172971
Junfeng Fan, Benedikt Gierlichs, Frederik Vercauteren
Publication date: 7 October 2011
Published in: Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-23951-9_10
Cited In (6)
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks
- Lattice-Based Fault Attacks Against ECMQV
- On Edwards curves and ZVP-attacks
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA)
- Combined Attack on CRT-RSA
Recommendations
- Title not available (Why is that?) ๐ ๐
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem ๐ ๐
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems ๐ ๐
- On the worst-case side-channel security of ECC point randomization in embedded devices ๐ ๐
- An efficient method against side-channel attacks on ECC ๐ ๐
- A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks ๐ ๐
- Common Points on Elliptic Curves: The Achillesโ Heel of Fault Attack Countermeasures ๐ ๐
- A formula for disaster: a unified approach to elliptic curve special-point-based attacks ๐ ๐
This page was built for publication: To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172971)