Validation of Elliptic Curve Public Keys
From MaRDI portal
Publication:4414710
Recommendations
Cited in
(13)- EPG-representations with Small Grid-Size
- Provably secure three-party password-based authenticated key exchange protocol
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Protecting ECC against fault attacks: the ring extension method revisited
- Guest editorial: Special issue in honor of Scott A. Vanstone
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- Another look at HMQV
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Fault-based attack on Montgomery's ladder algorithm
- Practical realisation and elimination of an ECC-related software bug attack
- Practical invalid curve attacks on TLS-ECDH
- Lattice-based fault attacks against ECMQV
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
This page was built for publication: Validation of Elliptic Curve Public Keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414710)