Information and Communications Security
From MaRDI portal
Publication:3407793
DOI10.1007/B13930zbMATH Open1300.94047OpenAlexW4210434599MaRDI QIDQ3407793FDOQ3407793
Authors: Mathieu Ciet, Marc Joye
Publication date: 23 February 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b13930
Recommendations
- On Randomness Extraction in Elliptic Curves
- Encoding-free ElGamal-type encryption schemes on elliptic curves
- Digit Set Randomization in Elliptic Curve Cryptography
- Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol
- scientific article; zbMATH DE number 2043310
- Related randomness security for public key encryption, revisited
- Elliptic curve analogues of a pseudorandom generator
- Pseudorandom Bits From Points on Elliptic Curves
- Two-source randomness extractors for elliptic curves for authenticated key exchange
randomizationside-channel analysiselliptic curve cryptographyimplementation attackselliptic curve modelspoint multiplication algorithms
Cited In (13)
- Binary elligator squared
- Impact of randomization in VKO mechanisms on overall security level
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Breaking randomized mixed-radix scalar multiplication algorithms
- Coordinate blinding over large prime fields
- Lattice attacks against elliptic-curve signatures with blinded scalar multiplication
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Trade-off approaches for leak resistant modular arithmetic in RNS
- Differential fault attack on Montgomery ladder and in the presence of scalar randomization
- Improving the Big Mac attack on elliptic curve cryptography
- On the worst-case side-channel security of ECC point randomization in embedded devices
This page was built for publication: Information and Communications Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3407793)