Exponent Recoding and Regular Exponentiation Algorithms
From MaRDI portal
Publication:3637149
DOI10.1007/978-3-642-02384-2_21zbMath1246.94031OpenAlexW1507823573MaRDI QIDQ3637149
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_21
Related Items (8)
Small scalar multiplication on Weierstrass curves using division polynomials ⋮ A fast parallel modular exponentiation algorithm ⋮ Extending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptography ⋮ Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ Four-dimensional Gallant-Lambert-Vanstone scalar multiplication ⋮ Koblitz curves over quadratic fields
Cites Work
- Low-cost solutions for preventing simple side-channel analysis: side-channel atomicity
- Checking before output may not be enough against fault-based cryptanalysis
- Power Analysis to ECC Using Differential Power Between Multiplication and Squaring
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Distinguishing Multiplications from Squaring Operations
- A Survey of Fast Exponentiation Methods
- The Doubling Attack – Why Upwards Is Better than Downwards
- A More Flexible Countermeasure against Side Channel Attacks Using Window Method
- Power Analysis Attacks
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Information Security Practice and Experience
- SPA Resistant Left-to-Right Integer Recodings
- Fractional Windows Revisited:Improved Signed-Digit Representations for Efficient Exponentiation
- Progress in Cryptology – Mycrypt 2005
- Applied Cryptography and Network Security
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Exponent Recoding and Regular Exponentiation Algorithms