Zero-Value Point Attacks on Elliptic Curve Cryptosystem
From MaRDI portal
Publication:3404406
DOI10.1007/10958513_17zbMath1255.94052OpenAlexW1521664783MaRDI QIDQ3404406
Tsuyoshi Takagi, Toru Akishita
Publication date: 9 February 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/10958513_17
addition formulaside-channel attackelliptic curve cryptosystemdifferential power analysiszero-value register
Related Items
Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves, Power Analysis to ECC Using Differential Power Between Multiplication and Squaring, Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers, Efficient elliptic curve scalar multiplication algorithms resistant to power analysis, Protecting the most significant bits in scalar multiplication algorithms, A formula for disaster: a unified approach to elliptic curve special-point-based attacks, Speeding up regular elliptic curve scalar multiplication without precomputation, On Edwards curves and ZVP-attacks, Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman, On Avoiding ZVP-Attacks Using Isogeny Volcanoes, Stochastic methods defeat regular RSA exponentiation algorithms with combined blinding methods
Uses Software