Information and Communications Security
From MaRDI portal
Publication:3407793
Recommendations
- On Randomness Extraction in Elliptic Curves
- Encoding-free ElGamal-type encryption schemes on elliptic curves
- Digit Set Randomization in Elliptic Curve Cryptography
- Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol
- scientific article; zbMATH DE number 2043310
- Related randomness security for public key encryption, revisited
- Elliptic curve analogues of a pseudorandom generator
- Pseudorandom Bits From Points on Elliptic Curves
- Two-source randomness extractors for elliptic curves for authenticated key exchange
Cited in
(13)- Binary elligator squared
- Impact of randomization in VKO mechanisms on overall security level
- Generalizing statistical ineffective fault attacks in the spirit of side-channel attacks
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Breaking randomized mixed-radix scalar multiplication algorithms
- Coordinate blinding over large prime fields
- Lattice attacks against elliptic-curve signatures with blinded scalar multiplication
- Key Bit-Dependent Attack on Protected PKC Using a Single Trace
- Trade-off approaches for leak resistant modular arithmetic in RNS
- Differential fault attack on Montgomery ladder and in the presence of scalar randomization
- Improving the Big Mac attack on elliptic curve cryptography
- On the worst-case side-channel security of ECC point randomization in embedded devices
This page was built for publication: Information and Communications Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3407793)