On Avoiding ZVP-Attacks Using Isogeny Volcanoes
From MaRDI portal
Publication:3605396
DOI10.1007/978-3-642-00306-6_20zbMath1292.94114MaRDI QIDQ3605396
Josep M. Miret Biosca, Daniel Sadornil, Magda Valls, R. Tomàs, Juan G. Tena Ayuso
Publication date: 24 February 2009
Published in: Information Security Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00306-6_20
94A60: Cryptography
Related Items
Uses Software
Cites Work
- Computing the height of volcanoes of \(\ell \)-isogenies of elliptic curves over finite fields
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- An Analysis of Goubin’s Refined Power Analysis Attack
- Computing Modular Polynomials
- Public Key Cryptography – PKC 2004
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item