scientific article; zbMATH DE number 2044541
From MaRDI portal
Publication:4448412
zbMATH Open1042.68585MaRDI QIDQ4448412FDOQ4448412
Authors: Bodo Möller
Publication date: 18 February 2004
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2200/22000324.htm
Title of this publication is not available (Why is that?)
Recommendations
Cited In (23)
- Title not available (Why is that?)
- Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm
- Random Order m-ary Exponentiation
- Enhanced elliptic curve scalar multiplication secure against side channel attacks and safe errors
- Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves
- There's something about \(m\)-ary. Fixed-point scalar multiplication protected against physical attacks
- An efficient method against side-channel attacks on ECC
- Efficient elliptic curve scalar multiplication algorithms resistant to power analysis
- Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains
- Extending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptography
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Power attacks on a side-channel resistant elliptic curve implementation
- A novel elliptic curve scalar multiplication algorithm against power analysis
- Implementation of cryptographic algorithms for elliptic curves
- A fast and secure elliptic curve scalar multiplication algorithm based on special addition chains
- To Infinity and Beyond: Combined Attack on ECC Using Points of Low Order
- Speeding up regular elliptic curve scalar multiplication without precomputation
- Exponent Recoding and Regular Exponentiation Algorithms
- Title not available (Why is that?)
- Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis
- T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
- Information Security and Privacy
- New stream ciphers based on elliptic curve point multiplication
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4448412)