Validation of Elliptic Curve Public Keys
From MaRDI portal
Publication:4414710
DOI10.1007/3-540-36288-6_16zbMATH Open1033.94509OpenAlexW1857035554MaRDI QIDQ4414710FDOQ4414710
Authors: Adrian Antipa, Daniel R. L. Brown, René Struik, Scott A. Vanstone, Alfred Menezes
Publication date: 27 July 2003
Published in: Public Key Cryptography — PKC 2003 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-36288-6_16
Recommendations
Cited In (13)
- EPG-representations with Small Grid-Size
- Provably secure three-party password-based authenticated key exchange protocol
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- Protecting ECC against fault attacks: the ring extension method revisited
- Guest editorial: Special issue in honor of Scott A. Vanstone
- Another look at HMQV
- Breaking the Bluetooth pairing -- the fixed coordinate invalid curve attack
- Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS
- Fault-based attack on Montgomery's ladder algorithm
- Practical realisation and elimination of an ECC-related software bug attack
- Practical invalid curve attacks on TLS-ECDH
- Lattice-based fault attacks against ECMQV
- Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
This page was built for publication: Validation of Elliptic Curve Public Keys
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4414710)