scientific article; zbMATH DE number 1504818

From MaRDI portal
Publication:4502796

zbMath0955.94009MaRDI QIDQ4502796

Jean-Sébastien Coron

Publication date: 4 March 2001


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (61)

Evaluating the Cache Side Channel Attacks Against ECDSAPractical Realisation and Elimination of an ECC-Related Software Bug AttackLocalized Electromagnetic Analysis of Cryptographic ImplementationsAn efficient method against side-channel attacks on ECCDigital signature with elliptic curves over the finite fieldsOnline Template Attack on ECDSA:Generic Cryptanalysis of Combined Countermeasures with Randomized BSD RepresentationsPower Analysis to ECC Using Differential Power Between Multiplication and SquaringKey Bit-Dependent Attack on Protected PKC Using a Single TraceImproving the arithmetic of elliptic curves in the Jacobi modelWhite-box ECDSA: challenges and existing solutionsFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4Resistance of isogeny-based cryptographic implementations to a fault attackA metric on the set of elliptic curves over \(\mathbb{F}_p\)A Leakage Resilient MACOn the worst-case side-channel security of ECC point randomization in embedded devicesEfficient hardware implementations for elliptic curve cryptography over Curve448Side-channel attacks countermeasure based on decomposed S-boxes for KuznyechikTrade-Off Approaches for Leak Resistant Modular Arithmetic in RNSGeneralised Mersenne numbers revisitedEfficient elliptic curve scalar multiplication algorithms resistant to power analysisScalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithmThe distributions of individual bits in the output of multiplicative operationsHorizontal collision correlation attack on elliptic curvesA Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage ModelRecovering secrets from prefix-dependent leakageT_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace AttacksDifferential fault attack on Montgomery ladder and in the presence of scalar randomizationA third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blindingAttacking embedded ECC implementations through CMOV side channelsLattice attacks against elliptic-curve signatures with blinded scalar multiplicationA Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage SettingFirst-order side channel attacks on Zhang's countermeasuresSpeeding up regular elliptic curve scalar multiplication without precomputationFaster Addition and Doubling on Elliptic CurvesA novel elliptic curve scalar multiplication algorithm against power analysisMethods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA AttacksSCATTER: A New Dimension in Side-ChannelExtended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysisExponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level SecurityMemory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate RepresentationLeakage-resilient group signature: definitions and constructionsExploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single TraceOn Avoiding ZVP-Attacks Using Isogeny VolcanoesElliptic curve scalar multiplication with x-coordinatePower Analysis for Secret Recovering and Reverse Engineering of Public Key AlgorithmsCryptography on twisted Edwards curves over local fieldsImproving the Big Mac Attack on Elliptic Curve CryptographySafe-Errors on SPA Protected Implementations with the Atomicity TechniqueDefeating RSA Multiply-Always and Message Blinding CountermeasuresFault Analysis Attack against an AES Prototype Chip Using RSLSecuring RSA against Fault Analysis by Double Addition Chain ExponentiationA Leakage-Resilient Mode of OperationConstructive and destructive use of compilers in elliptic curve cryptographyPartial Key Exposure Attacks on RSA with Multiple Exponent PairsRandom Order m-ary ExponentiationExponent Recoding and Regular Exponentiation AlgorithmsDistinguishing Multiplications from Squaring OperationsSquare Always ExponentiationThwarting side-channel analysis against RSA cryptosystems with additive blindingBlack-box constructions of signature schemes in the bounded leakage setting







This page was built for publication: