scientific article; zbMATH DE number 1504818
From MaRDI portal
Publication:4502796
zbMath0955.94009MaRDI QIDQ4502796
Publication date: 4 March 2001
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (61)
Evaluating the Cache Side Channel Attacks Against ECDSA ⋮ Practical Realisation and Elimination of an ECC-Related Software Bug Attack ⋮ Localized Electromagnetic Analysis of Cryptographic Implementations ⋮ An efficient method against side-channel attacks on ECC ⋮ Digital signature with elliptic curves over the finite fields ⋮ Online Template Attack on ECDSA: ⋮ Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations ⋮ Power Analysis to ECC Using Differential Power Between Multiplication and Squaring ⋮ Key Bit-Dependent Attack on Protected PKC Using a Single Trace ⋮ Improving the arithmetic of elliptic curves in the Jacobi model ⋮ White-box ECDSA: challenges and existing solutions ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ Resistance of isogeny-based cryptographic implementations to a fault attack ⋮ A metric on the set of elliptic curves over \(\mathbb{F}_p\) ⋮ A Leakage Resilient MAC ⋮ On the worst-case side-channel security of ECC point randomization in embedded devices ⋮ Efficient hardware implementations for elliptic curve cryptography over Curve448 ⋮ Side-channel attacks countermeasure based on decomposed S-boxes for Kuznyechik ⋮ Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS ⋮ Generalised Mersenne numbers revisited ⋮ Efficient elliptic curve scalar multiplication algorithms resistant to power analysis ⋮ Scalar recoding and regular \(2^w\)-ary right-to-left EC scalar multiplication algorithm ⋮ The distributions of individual bits in the output of multiplicative operations ⋮ Horizontal collision correlation attack on elliptic curves ⋮ A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model ⋮ Recovering secrets from prefix-dependent leakage ⋮ T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks ⋮ Differential fault attack on Montgomery ladder and in the presence of scalar randomization ⋮ A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding ⋮ Attacking embedded ECC implementations through CMOV side channels ⋮ Lattice attacks against elliptic-curve signatures with blinded scalar multiplication ⋮ A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting ⋮ First-order side channel attacks on Zhang's countermeasures ⋮ Speeding up regular elliptic curve scalar multiplication without precomputation ⋮ Faster Addition and Doubling on Elliptic Curves ⋮ A novel elliptic curve scalar multiplication algorithm against power analysis ⋮ Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks ⋮ SCATTER: A New Dimension in Side-Channel ⋮ Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis ⋮ Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security ⋮ Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation ⋮ Leakage-resilient group signature: definitions and constructions ⋮ Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace ⋮ On Avoiding ZVP-Attacks Using Isogeny Volcanoes ⋮ Elliptic curve scalar multiplication with x-coordinate ⋮ Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms ⋮ Cryptography on twisted Edwards curves over local fields ⋮ Improving the Big Mac Attack on Elliptic Curve Cryptography ⋮ Safe-Errors on SPA Protected Implementations with the Atomicity Technique ⋮ Defeating RSA Multiply-Always and Message Blinding Countermeasures ⋮ Fault Analysis Attack against an AES Prototype Chip Using RSL ⋮ Securing RSA against Fault Analysis by Double Addition Chain Exponentiation ⋮ A Leakage-Resilient Mode of Operation ⋮ Constructive and destructive use of compilers in elliptic curve cryptography ⋮ Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs ⋮ Random Order m-ary Exponentiation ⋮ Exponent Recoding and Regular Exponentiation Algorithms ⋮ Distinguishing Multiplications from Squaring Operations ⋮ Square Always Exponentiation ⋮ Thwarting side-channel analysis against RSA cryptosystems with additive blinding ⋮ Black-box constructions of signature schemes in the bounded leakage setting
This page was built for publication: